Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1543670
MD5:f7be8753894e3b1f1829c067805e430a
SHA1:ca077aac7ec9b14cea8970bacd13678a3b1eeb2f
SHA256:02ef83bdd19b7b7b00226d160f5907c48d36d1ba923c2a1694ac93ca7a34d4cd
Tags:exeuser-Bitsight
Infos:

Detection

Credential Flusher
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Credential Flusher
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Connects to many different domains
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
OS version to string mapping found (often used in BOTs)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • file.exe (PID: 7420 cmdline: "C:\Users\user\Desktop\file.exe" MD5: F7BE8753894E3B1F1829C067805E430A)
    • taskkill.exe (PID: 7436 cmdline: taskkill /F /IM firefox.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 7444 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 7540 cmdline: taskkill /F /IM chrome.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 7548 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 7604 cmdline: taskkill /F /IM msedge.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 7612 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 7668 cmdline: taskkill /F /IM opera.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 7676 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 7732 cmdline: taskkill /F /IM brave.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 7748 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • firefox.exe (PID: 7800 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • firefox.exe (PID: 7832 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
    • firefox.exe (PID: 7848 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 8088 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2280 -parentBuildID 20230927232528 -prefsHandle 2224 -prefMapHandle 2208 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0d8a1b39-e660-4dac-b240-ef4997528783} 7848 "\\.\pipe\gecko-crash-server-pipe.7848" 20e3e06dd10 socket MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 7412 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4236 -parentBuildID 20230927232528 -prefsHandle 4132 -prefMapHandle 4228 -prefsLen 26208 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {682e83fa-bff4-48c5-9ba5-30aa68b48bf0} 7848 "\\.\pipe\gecko-crash-server-pipe.7848" 20e3e083610 rdd MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 7788 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5108 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5100 -prefMapHandle 5096 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c5983122-0af4-4d78-a131-0565779d2050} 7848 "\\.\pipe\gecko-crash-server-pipe.7848" 20e58f22910 utility MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: file.exe PID: 7420JoeSecurity_CredentialFlusherYara detected Credential FlusherJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: file.exeReversingLabs: Detection: 47%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
    Source: file.exeJoe Sandbox ML: detected
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49743 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.4:49744 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.4:49750 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49760 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49766 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49765 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49776 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49777 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 151.101.65.91:443 -> 192.168.2.4:49779 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49783 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49781 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49782 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49784 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49826 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49827 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49828 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49835 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49834 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49836 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49837 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49955 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49952 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49953 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49954 version: TLS 1.2
    Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdbV source: gmpopenh264.dll.tmp.13.dr
    Source: Binary string: pnrpnsp.pdb source: firefox.exe, 0000000D.00000003.1847095013.0000020E59701000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: npmproxy.pdbUGP source: firefox.exe, 0000000D.00000003.1847670361.0000020E59701000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: netprofm.pdb source: firefox.exe, 0000000D.00000003.1844284802.0000020E4B575000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdb source: gmpopenh264.dll.tmp.13.dr
    Source: Binary string: npmproxy.pdb source: firefox.exe, 0000000D.00000003.1847670361.0000020E59701000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: pnrpnsp.pdbUGP source: firefox.exe, 0000000D.00000003.1847095013.0000020E59701000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: netprofm.pdbUGP source: firefox.exe, 0000000D.00000003.1844284802.0000020E4B575000.00000004.00000020.00020000.00000000.sdmp
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C7DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00C7DBBE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C868EE FindFirstFileW,FindClose,0_2_00C868EE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C8698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00C8698F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C7D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00C7D076
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C7D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00C7D3A9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C89642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00C89642
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C8979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00C8979D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C89B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00C89B2B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C85C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00C85C97
    Source: firefox.exeMemory has grown: Private usage: 37MB later: 180MB
    Source: unknownNetwork traffic detected: DNS query count 34
    Source: Joe Sandbox ViewIP Address: 34.149.100.209 34.149.100.209
    Source: Joe Sandbox ViewIP Address: 151.101.65.91 151.101.65.91
    Source: Joe Sandbox ViewIP Address: 34.117.188.166 34.117.188.166
    Source: Joe Sandbox ViewIP Address: 34.160.144.191 34.160.144.191
    Source: Joe Sandbox ViewJA3 fingerprint: fb0aa01abe9d8e4037eb3473ca6e2dca
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C8CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_00C8CE44
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: firefox.exe, 0000000D.00000003.1835085588.0000020E560C8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1916956970.0000020E560D1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1922294085.0000020E560D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8*://www.facebook.com/* equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1883902435.0000020E571CE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904238891.0000020E571D3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1896023620.0000020E571CE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8*://www.youtube.com/* equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1893641781.0000020E59532000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1893641781.0000020E5952C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8https://www.facebook.com/ equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1893641781.0000020E59532000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1893641781.0000020E5952C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8https://www.youtube.com/ equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1835085588.0000020E560C8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1912019678.0000020E4F894000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1916956970.0000020E560D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8www.facebook.com equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1883902435.0000020E571CE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904238891.0000020E571D3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1896023620.0000020E571CE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8www.youtube.com equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1893641781.0000020E59532000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1893641781.0000020E5952C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com/ equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1893641781.0000020E59532000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1893641781.0000020E5952C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/ equals www.youtube.com (Youtube)
    Source: firefox.exe, 00000010.00000002.3556417802.0000022EE8F0A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3555815281.000001C5F300C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.facebook.com (Facebook)
    Source: firefox.exe, 00000010.00000002.3556417802.0000022EE8F0A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3555815281.000001C5F300C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.twitter.com (Twitter)
    Source: firefox.exe, 00000010.00000002.3556417802.0000022EE8F0A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3555815281.000001C5F300C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1883902435.0000020E57196000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1921693885.0000020E57199000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1909808080.0000020E57196000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: moz-extension://a581a2f1-688c-434b-8db8-16166b1993d9/injections/js/bug1842437-www.youtube.com-performance-now-precision.js equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1835085588.0000020E560C8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1912019678.0000020E4F894000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1916956970.0000020E560D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: www.facebook.com equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1883902435.0000020E571CE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904238891.0000020E571D3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1896023620.0000020E571CE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: www.youtube.com equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1927863980.0000020E5763A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: www.youtube.com- equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1914442706.0000020E501C8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1926229745.0000020E4E6F4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1889000825.0000020E501C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: x*://www.facebook.com/platform/impression.php* equals www.facebook.com (Facebook)
    Source: global trafficDNS traffic detected: DNS query: prod.classify-client.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: youtube.com
    Source: global trafficDNS traffic detected: DNS query: detectportal.firefox.com
    Source: global trafficDNS traffic detected: DNS query: prod.detectportal.prod.cloudops.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: contile.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: spocs.getpocket.com
    Source: global trafficDNS traffic detected: DNS query: prod.ads.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: prod.balrog.prod.cloudops.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: content-signature-2.cdn.mozilla.net
    Source: global trafficDNS traffic detected: DNS query: prod.content-signature-chains.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: example.org
    Source: global trafficDNS traffic detected: DNS query: ipv4only.arpa
    Source: global trafficDNS traffic detected: DNS query: o.pki.goog
    Source: global trafficDNS traffic detected: DNS query: pki-goog.l.google.com
    Source: global trafficDNS traffic detected: DNS query: shavar.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: push.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: telemetry-incoming.r53-2.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: firefox.settings.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: prod.remote-settings.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: r10.o.lencr.org
    Source: global trafficDNS traffic detected: DNS query: support.mozilla.org
    Source: global trafficDNS traffic detected: DNS query: us-west1.prod.sumo.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: www.youtube.com
    Source: global trafficDNS traffic detected: DNS query: www.facebook.com
    Source: global trafficDNS traffic detected: DNS query: www.wikipedia.org
    Source: global trafficDNS traffic detected: DNS query: youtube-ui.l.google.com
    Source: global trafficDNS traffic detected: DNS query: www.reddit.com
    Source: global trafficDNS traffic detected: DNS query: star-mini.c10r.facebook.com
    Source: global trafficDNS traffic detected: DNS query: dyna.wikimedia.org
    Source: global trafficDNS traffic detected: DNS query: reddit.map.fastly.net
    Source: global trafficDNS traffic detected: DNS query: twitter.com
    Source: global trafficDNS traffic detected: DNS query: services.addons.mozilla.org
    Source: global trafficDNS traffic detected: DNS query: normandy.cdn.mozilla.net
    Source: global trafficDNS traffic detected: DNS query: normandy-cdn.services.mozilla.com
    Source: unknownHTTP traffic detected: POST /s/wr3/yvU HTTP/1.1Host: o.pki.googUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateContent-Type: application/ocsp-requestContent-Length: 84Connection: keep-alivePragma: no-cacheCache-Control: no-cacheData Raw: 30 52 30 50 30 4e 30 4c 30 4a 30 09 06 05 2b 0e 03 02 1a 05 00 04 14 12 ab 48 b9 b7 63 da 7e 2d 86 c3 db b3 c2 77 3b 29 37 2d 5a 04 14 c7 81 f5 fd 8e 88 d9 00 3c 4d 63 a2 50 31 24 a0 ce 23 fe 23 02 11 00 ca f5 66 f3 89 88 42 59 09 d1 26 77 8f 29 a2 0c Data Ascii: 0R0P0N0L0J0+Hc~-w;)7-Z<McP1$##fBY&w)
    Source: firefox.exe, 0000000D.00000003.1929245968.0000020E51D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://127.0.0.1:
    Source: firefox.exe, 0000000D.00000003.1947361310.0000020E4EF53000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1931997170.0000020E4EF53000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a9.com/-/spec/opensearch/1.0/
    Source: firefox.exe, 0000000D.00000003.1947361310.0000020E4EF53000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1931997170.0000020E4EF53000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a9.com/-/spec/opensearch/1.1/
    Source: firefox.exe, 0000000D.00000003.1947361310.0000020E4EF53000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1931997170.0000020E4EF53000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a9.com/-/spec/opensearchdescription/1.0/
    Source: firefox.exe, 0000000D.00000003.1947361310.0000020E4EF53000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1931997170.0000020E4EF53000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a9.com/-/spec/opensearchdescription/1.1/
    Source: firefox.exe, 0000000D.00000003.1831820200.0000020E595DB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1922873013.0000020E55EC3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1908566467.0000020E4F881000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914442706.0000020E501B4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1833955414.0000020E58FCD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904447045.0000020E55EC3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885784955.0000020E513CD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1889000825.0000020E501B1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836356418.0000020E513CE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1944998101.0000020E55EC3000.00000004.00000800.00020000.00000000.sdmp, cert9.db.13.dr, cert9.db-journal.13.drString found in binary or memory: http://c.pki.goog/r/r1.crl0
    Source: firefox.exe, 0000000D.00000003.1836990851.0000020E51380000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1889000825.0000020E501A3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1922873013.0000020E55EC3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1908566467.0000020E4F881000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836990851.0000020E51370000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1833955414.0000020E58FCD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904447045.0000020E55EC3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914442706.0000020E501A4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1889000825.0000020E501BD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1944998101.0000020E55EC3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914442706.0000020E501BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://c.pki.goog/wr3/aoQHM7OuxaU.crl0
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: firefox.exe, 0000000D.00000003.1805451737.0000020E4B553000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805834509.0000020E4B554000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1810661559.0000020E4B54D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
    Source: firefox.exe, 0000000D.00000003.1831820200.0000020E595DB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885784955.0000020E513CD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836356418.0000020E513CE000.00000004.00000800.00020000.00000000.sdmp, cert9.db.13.dr, cert9.db-journal.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
    Source: firefox.exe, 0000000D.00000003.1831820200.0000020E595DB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885784955.0000020E513CD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836356418.0000020E513CE000.00000004.00000800.00020000.00000000.sdmp, cert9.db.13.dr, cert9.db-journal.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
    Source: firefox.exe, 0000000D.00000003.1844476646.0000020E4B56F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845001864.0000020E4B56E000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842942453.0000020E4B565000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1847325016.0000020E4B565000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1840063070.0000020E4B548000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805451737.0000020E4B553000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805834509.0000020E4B554000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845964923.0000020E4B56F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1844145987.0000020E4B56D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1810661559.0000020E4B54D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1839920329.0000020E4B565000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1848817014.0000020E4B56E000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849836599.0000020E4B56F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
    Source: firefox.exe, 0000000D.00000003.1919828898.0000020E4F6F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1908873080.0000020E4F6EA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836990851.0000020E51359000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.pki.goog/gsr1/gsr1.crl0;
    Source: firefox.exe, 0000000D.00000003.1831820200.0000020E595DB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885784955.0000020E513CD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836356418.0000020E513CE000.00000004.00000800.00020000.00000000.sdmp, cert9.db.13.dr, cert9.db-journal.13.drString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
    Source: firefox.exe, 0000000D.00000003.1805451737.0000020E4B553000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805834509.0000020E4B554000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1810661559.0000020E4B54D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digiRq
    Source: firefox.exe, 0000000D.00000003.1810661559.0000020E4B54D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertA
    Source: firefox.exe, 0000000D.00000003.1805451737.0000020E4B553000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805834509.0000020E4B554000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
    Source: firefox.exe, 0000000D.00000003.1831820200.0000020E595DB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885784955.0000020E513CD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836356418.0000020E513CE000.00000004.00000800.00020000.00000000.sdmp, cert9.db.13.dr, cert9.db-journal.13.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
    Source: firefox.exe, 0000000D.00000003.1831820200.0000020E595DB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885784955.0000020E513CD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836356418.0000020E513CE000.00000004.00000800.00020000.00000000.sdmp, cert9.db.13.dr, cert9.db-journal.13.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
    Source: firefox.exe, 0000000D.00000003.1844476646.0000020E4B56F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845001864.0000020E4B56E000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842942453.0000020E4B565000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1847325016.0000020E4B565000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1840063070.0000020E4B548000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805451737.0000020E4B553000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805834509.0000020E4B554000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845964923.0000020E4B56F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1844145987.0000020E4B56D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1810661559.0000020E4B54D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1839920329.0000020E4B565000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1848817014.0000020E4B56E000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849836599.0000020E4B56F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
    Source: firefox.exe, 0000000D.00000003.1805451737.0000020E4B553000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805834509.0000020E4B554000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-;q
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: firefox.exe, 0000000D.00000003.1831820200.0000020E595DB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885784955.0000020E513CD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836356418.0000020E513CE000.00000004.00000800.00020000.00000000.sdmp, cert9.db.13.dr, cert9.db-journal.13.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
    Source: firefox.exe, 0000000D.00000003.1831820200.0000020E595DB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885784955.0000020E513CD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836356418.0000020E513CE000.00000004.00000800.00020000.00000000.sdmp, cert9.db.13.dr, cert9.db-journal.13.drString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
    Source: firefox.exe, 0000000D.00000003.1884864530.0000020E560C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com
    Source: firefox.exe, 0000000D.00000003.1884864530.0000020E560C8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1951585023.0000020E5766A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/canonical.html
    Source: firefox.exe, 0000000D.00000003.1884864530.0000020E560C8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/success.txt?ipv4
    Source: firefox.exe, 0000000D.00000003.1910094005.0000020E5613C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/success.txt?ipv6
    Source: firefox.exe, 0000000D.00000003.1929517783.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1907644304.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://developer.mozilla.org/en/docs/DOM:element.addEventListener
    Source: firefox.exe, 0000000D.00000003.1929517783.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1907644304.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://developer.mozilla.org/en/docs/DOM:element.removeEventListener
    Source: firefox.exe, 0000000D.00000003.1839700165.0000020E44DDA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://en.w
    Source: firefox.exe, 0000000D.00000003.1831820200.0000020E595DB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1922873013.0000020E55EC3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1908566467.0000020E4F881000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914442706.0000020E501B4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1833955414.0000020E58FCD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904447045.0000020E55EC3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885784955.0000020E513CD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1889000825.0000020E501B1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836356418.0000020E513CE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1944998101.0000020E55EC3000.00000004.00000800.00020000.00000000.sdmp, cert9.db.13.dr, cert9.db-journal.13.drString found in binary or memory: http://i.pki.goog/r1.crt0
    Source: firefox.exe, 0000000D.00000003.1836990851.0000020E51380000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1889000825.0000020E501A3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1922873013.0000020E55EC3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1908566467.0000020E4F881000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836990851.0000020E51370000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1833955414.0000020E58FCD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904447045.0000020E55EC3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914442706.0000020E501A4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1889000825.0000020E501BD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1944998101.0000020E55EC3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914442706.0000020E501BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://i.pki.goog/wr3.crt0
    Source: firefox.exe, 0000000D.00000003.1912986547.0000020E4F447000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://json-schema.org/draft-04/schema#
    Source: firefox.exe, 0000000D.00000003.1912986547.0000020E4F447000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://json-schema.org/draft-06/schema#
    Source: firefox.exe, 0000000D.00000003.1912986547.0000020E4F447000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://json-schema.org/draft-07/schema#-
    Source: firefox.exe, 0000000D.00000003.1863659170.0000020E4F728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mozilla.o
    Source: firefox.exe, 0000000D.00000003.1912986547.0000020E4F447000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1862403405.0000020E4F0B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mozilla.org
    Source: firefox.exe, 0000000D.00000003.1840950084.0000020E561AD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849669408.0000020E4F9C8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1792497617.0000020E5902B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1797962557.0000020E4E4F4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1887682946.0000020E50653000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1865606048.0000020E55FC0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1866840665.0000020E4F945000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902226951.0000020E4E4D1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1791217118.0000020E4F9D9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1788249354.0000020E55FC2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1767746372.0000020E516E4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1791392609.0000020E4F9B8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1846667162.0000020E4E4F4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1867398153.0000020E4E48C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1867265155.0000020E4F7B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738840880.0000020E4E4FB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1797962557.0000020E4E4C3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738355446.0000020E4E4FC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884380055.0000020E561AD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1952284916.0000020E5185F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1866840665.0000020E4F94A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mozilla.org/MPL/2.0/.
    Source: firefox.exe, 0000000D.00000003.1908721726.0000020E4F867000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://o.pki.goog/s/wr3/yvU
    Source: firefox.exe, 0000000D.00000003.1836990851.0000020E51380000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1889000825.0000020E501A3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1922873013.0000020E55EC3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1908566467.0000020E4F881000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836990851.0000020E51370000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1833955414.0000020E58FCD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904447045.0000020E55EC3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914442706.0000020E501A4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1889000825.0000020E501BD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1944998101.0000020E55EC3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914442706.0000020E501BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://o.pki.goog/s/wr3/yvU0%
    Source: firefox.exe, 0000000D.00000003.1810661559.0000020E4B54D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com
    Source: firefox.exe, 0000000D.00000003.1831820200.0000020E595DB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885784955.0000020E513CD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836356418.0000020E513CE000.00000004.00000800.00020000.00000000.sdmp, cert9.db.13.dr, cert9.db-journal.13.drString found in binary or memory: http://ocsp.digicert.com0
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ocsp.digicert.com0N
    Source: firefox.exe, 0000000D.00000003.1844476646.0000020E4B56F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845001864.0000020E4B56E000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842942453.0000020E4B565000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1847325016.0000020E4B565000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1840063070.0000020E4B548000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805451737.0000020E4B553000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805834509.0000020E4B554000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845964923.0000020E4B56F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1844145987.0000020E4B56D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1810661559.0000020E4B54D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1839920329.0000020E4B565000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1848817014.0000020E4B56E000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849836599.0000020E4B56F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
    Source: firefox.exe, 0000000D.00000003.1919828898.0000020E4F6F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1908873080.0000020E4F6EA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836990851.0000020E51359000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.pki.goog/gsr10)
    Source: firefox.exe, 0000000D.00000003.1831820200.0000020E595DB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885784955.0000020E513CD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836356418.0000020E513CE000.00000004.00000800.00020000.00000000.sdmp, cert9.db.13.dr, cert9.db-journal.13.drString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ocsp.thawte.com0
    Source: firefox.exe, 0000000D.00000003.1844476646.0000020E4B56F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845001864.0000020E4B56E000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842942453.0000020E4B565000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1847325016.0000020E4B565000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845964923.0000020E4B56F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1844145987.0000020E4B56D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1839920329.0000020E4B565000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1848817014.0000020E4B56E000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849836599.0000020E4B56F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://osoft.com/pki/crl/products/MicTimStaPCA_
    Source: firefox.exe, 0000000D.00000003.1919828898.0000020E4F6F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1908873080.0000020E4F6EA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836990851.0000020E51359000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pki.goog/gsr1/gsr1.crt02
    Source: firefox.exe, 0000000D.00000003.1836990851.0000020E51380000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1908566467.0000020E4F881000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836990851.0000020E51370000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r10.i.lencr.org/0$
    Source: firefox.exe, 0000000D.00000003.1920469645.0000020E594C1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1832439384.0000020E594BB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r10.o.lencr.org
    Source: firefox.exe, 0000000D.00000003.1832439384.0000020E594BB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1927863980.0000020E5763A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r10.o.lencr.org/
    Source: firefox.exe, 0000000D.00000003.1836990851.0000020E51380000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1908566467.0000020E4F881000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836990851.0000020E51370000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r10.o.lencr.org0#
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://www.mozilla.com0
    Source: firefox.exe, 0000000D.00000003.1883714104.0000020E5844E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/2005/app-updatex
    Source: firefox.exe, 0000000D.00000003.1947361310.0000020E4EF53000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1931997170.0000020E4EF53000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/2006/browser/search/
    Source: firefox.exe, 0000000D.00000003.1887914582.0000020E50622000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1835085588.0000020E560C8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1896101946.0000020E5613C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884597621.0000020E5613C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1888026977.0000020E505DC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1763227904.0000020E4FE24000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1916956970.0000020E560D1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1922294085.0000020E560D1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1910094005.0000020E5613C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1763006724.0000020E4FEC1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884864530.0000020E560C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul
    Source: firefox.exe, 0000000D.00000003.1918557139.0000020E505E2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1888026977.0000020E505DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xulh
    Source: firefox.exe, 0000000D.00000003.1888026977.0000020E505DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xull
    Source: firefox.exe, 0000000D.00000003.1918557139.0000020E505E2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1888026977.0000020E505DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul~
    Source: firefox.exe, 00000010.00000003.1749748322.0000022EE968D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000003.1746957323.0000022EE968D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3559825533.0000022EE968D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000003.1745748794.0000022EE968D000.00000004.00000020.00020000.00000000.sdmp, mozilla-temp-41.13.drString found in binary or memory: http://www.videolan.org/x264.html
    Source: cert9.db.13.dr, cert9.db-journal.13.drString found in binary or memory: http://x1.c.lencr.org/0
    Source: cert9.db.13.dr, cert9.db-journal.13.drString found in binary or memory: http://x1.i.lencr.org/0
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.malware-error.mozilla.com/?url=
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.phish-error.mozilla.com/?url=
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.phish-report.mozilla.com/?url=
    Source: firefox.exe, 0000000D.00000003.1924797759.0000020E4EFD6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://MD8.mozilla.org/1/m
    Source: firefox.exe, 0000000D.00000003.1727553124.0000020E4DC00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728991408.0000020E4B783000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727882457.0000020E4B71F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728511436.0000020E4B762000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728194404.0000020E4B740000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.duckduckgo.com/ac/
    Source: firefox.exe, 0000000D.00000003.1950899700.0000020E58E69000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834625277.0000020E58E54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com
    Source: firefox.exe, 0000000D.00000003.1918209761.0000020E507C4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com/
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com/settings/clients
    Source: firefox.exe, 0000000D.00000003.1929139466.0000020E55E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.firefox.comK
    Source: firefox.exe, 0000000D.00000003.1860699500.0000020E590C5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1763315728.0000020E4FD78000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1876978015.0000020E590C5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1796330159.0000020E590C7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1794982623.0000020E590C7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1863981506.0000020E590C5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864634254.0000020E59077000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1909808080.0000020E5712C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1881026118.0000020E59077000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1860699500.0000020E59049000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1796408937.0000020E59077000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1874129922.0000020E59077000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1883902435.0000020E5712C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1795205306.0000020E59077000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1793051762.0000020E5907B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1882213624.0000020E5907A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1921745518.0000020E5718C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1860699500.0000020E59077000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/challenge/pwd
    Source: file.exe, 00000000.00000002.1748474379.0000000001458000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/challenge/pwdE
    Source: firefox.exe, 0000000D.00000003.1883902435.0000020E5712C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/language-tools/
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/search-engines/
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/search?q=%TERMS%&platform=%OS%&appver=%VERSION%
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/themes
    Source: firefox.exe, 0000000D.00000003.1927863980.0000020E5763A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/enhancer-for-youtube/
    Source: firefox.exe, 0000000D.00000003.1927863980.0000020E5763A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/facebook-container/
    Source: firefox.exe, 0000000D.00000003.1927863980.0000020E5763A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
    Source: firefox.exe, 0000000D.00000003.1927863980.0000020E5763A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/to-google-translate/
    Source: firefox.exe, 0000000D.00000003.1927863980.0000020E5763A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/wikipedia-context-menu-search/
    Source: firefox.exe, 0000000D.00000003.1922241961.0000020E560E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1835085588.0000020E560C8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1916956970.0000020E560D1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884864530.0000020E560C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ads-us.rd.linksynergy.com/as.php
    Source: firefox.exe, 0000000D.00000003.1926229745.0000020E4E6F4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1905565418.0000020E4FFFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ads.stickyadstv.com/firefox-etp
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://api.accounts.firefox.com/v1
    Source: firefox.exe, 0000000D.00000003.1927863980.0000020E57696000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
    Source: firefox.exe, 0000000D.00000003.1927863980.0000020E57696000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://app.adjust.com/a8bxj8j?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://apps.apple.com/app/firefox-private-safe-browser/id989804926
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://apps.apple.com/us/app/firefox-private-network-vpn/id1489407738
    Source: firefox.exe, 0000000D.00000003.1883641352.0000020E58EE5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1920023056.0000020E4E9D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org
    Source: firefox.exe, 0000000D.00000003.1950187907.0000020E58EE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/3/GMP/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL%/%OS_VER
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/3/SystemAddons/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL
    Source: firefox.exe, 0000000D.00000003.1834146332.0000020E58EA6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1950246289.0000020E58EA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/6/Firefox/118.0.1/20230927232528/WINNT_x86_64-msvc-x64/en-US/release
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://blocked.cdn.mozilla.net/
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://blocked.cdn.mozilla.net/%blockID%.html
    Source: firefox.exe, 0000000F.00000002.3556643045.000001DAFD5B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3556417802.0000022EE8FEF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3558782884.000001C5F3303000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
    Source: firefox.exe, 0000000F.00000002.3556643045.000001DAFD5B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3556417802.0000022EE8FEF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3558782884.000001C5F3303000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
    Source: firefox.exe, 0000000D.00000003.1907644304.0000020E4FC42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mo
    Source: firefox.exe, 0000000D.00000003.1799416725.0000020E4E459000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1189266
    Source: firefox.exe, 0000000D.00000003.1799416725.0000020E4E459000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
    Source: firefox.exe, 0000000D.00000003.1799416725.0000020E4E459000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1207993
    Source: firefox.exe, 0000000D.00000003.1799416725.0000020E4E459000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
    Source: firefox.exe, 0000000D.00000003.1799416725.0000020E4E459000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
    Source: firefox.exe, 0000000D.00000003.1799348897.0000020E4E443000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1799416725.0000020E4E459000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
    Source: firefox.exe, 0000000D.00000003.1865606048.0000020E55FC0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1788249354.0000020E55FC2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1795530867.0000020E55FC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1694699#c21
    Source: firefox.exe, 0000000D.00000003.1799416725.0000020E4E459000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=792480
    Source: firefox.exe, 0000000D.00000003.1799416725.0000020E4E459000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=809550
    Source: firefox.exe, 0000000D.00000003.1799416725.0000020E4E459000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=840161
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
    Source: firefox.exe, 0000000D.00000003.1727553124.0000020E4DC00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728991408.0000020E4B783000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727882457.0000020E4B71F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728511436.0000020E4B762000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728194404.0000020E4B740000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://completion.amazon.com/search/complete?q=
    Source: firefox.exe, 0000000D.00000003.1885703548.0000020E518B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1897260070.0000020E518B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://content-signature-2.cdn.mozilla.net
    Source: firefox.exe, 0000000D.00000003.1920023056.0000020E4E9C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://content-signature-2.cdn.mozilla.net/
    Source: firefox.exe, 0000000D.00000003.1919236346.0000020E4FD84000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://content-signature-2.cdn.mozilla.net/chains/remote-settings.content-signature.mozilla.org-202
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://content.cdn.mozilla.net
    Source: firefox.exe, 0000000F.00000002.3556643045.000001DAFD5B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3556417802.0000022EE8FEF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3558782884.000001C5F3303000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
    Source: firefox.exe, 0000000F.00000002.3556643045.000001DAFD5B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3556417802.0000022EE8FEF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3558782884.000001C5F3303000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
    Source: firefox.exe, 0000000D.00000003.1923191951.0000020E55E81000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904447045.0000020E55E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile.services.mozilla.com
    Source: firefox.exe, 0000000D.00000003.1929085066.0000020E55E38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile.services.mozilla.com/
    Source: firefox.exe, 0000000D.00000003.1929085066.0000020E55E38000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://contile.services.mozilla.com/v1/tiles
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://coverage.mozilla.org
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://crash-stats.mozilla.org/report/index/
    Source: firefox.exe, 0000000D.00000003.1764875885.0000020E4F023000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1767386803.0000020E4F023000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://crbug.com/993268
    Source: firefox.exe, 0000000D.00000003.1833536090.0000020E592BC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/report-to/scaffolding/sytroprc:52:0
    Source: firefox.exe, 0000000D.00000003.1833536090.0000020E592BC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/scaffolding/sytroprc:52:0
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://dap-02.api.divviup.org
    Source: firefox.exe, 0000000D.00000003.1884380055.0000020E561CB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1840950084.0000020E561CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://datastudio.google.com/embed/reporting/
    Source: firefox.exe, 0000000D.00000003.1929517783.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1907644304.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
    Source: firefox.exe, 0000000D.00000003.1907644304.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
    Source: firefox.exe, 0000000D.00000003.1929517783.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1907644304.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/docs/Web/API/Element/setPointerCaptureElementReleaseCaptureWarning
    Source: firefox.exe, 0000000D.00000003.1929517783.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1907644304.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/docs/Web/API/Push_API/Using_the_Push_API#EncryptionPreventDefaultFromP
    Source: firefox.exe, 0000000D.00000003.1929517783.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1907644304.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
    Source: firefox.exe, 0000000D.00000003.1791217118.0000020E4F9DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Mozilla/Tech/XPCOM/Reference/Interface/nsIEffectiveTLDServi
    Source: firefox.exe, 0000000D.00000003.1767386803.0000020E4F023000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/API/ElementCSSInlineStyle/style#setting_styles)
    Source: firefox.exe, 0000000D.00000003.1767386803.0000020E4F023000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Statements/for-await...of
    Source: firefox.exe, 0000000D.00000003.1764875885.0000020E4F023000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1767386803.0000020E4F023000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://developers.google.com/safe-browsing/v4/advisory
    Source: firefox.exe, 0000000D.00000003.1796408937.0000020E59098000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1863981506.0000020E59098000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1787468043.0000020E59098000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727553124.0000020E4DC00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728991408.0000020E4B783000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727882457.0000020E4B71F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728511436.0000020E4B762000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1791530720.0000020E4F94F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728194404.0000020E4B740000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1795205306.0000020E59098000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1860699500.0000020E59098000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/
    Source: firefox.exe, 0000000D.00000003.1768420800.0000020E4F1A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/y
    Source: firefox.exe, 0000000D.00000003.1735061783.0000020E4C729000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1735306282.0000020E4C733000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1734202540.0000020E4C733000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://e.mail.ru/cgi-bin/sentmsg?mailto=%s
    Source: firefox.exe, 0000000D.00000003.1735061783.0000020E4C729000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1735306282.0000020E4C733000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1734202540.0000020E4C733000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://email.seznam.cz/newMessageScreen?mailto=%s
    Source: firefox.exe, 0000000D.00000003.1929517783.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1907644304.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://extensionworkshop.com/documentation/publish/self-distribution/
    Source: firefox.exe, 0000000D.00000003.1884195043.0000020E5844E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834819373.0000020E5844E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1952219975.0000020E518B8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1951416554.0000020E584DB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836260570.0000020E518B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885703548.0000020E518B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1897260070.0000020E518B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1883714104.0000020E5844E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3556417802.0000022EE8F12000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3555815281.000001C5F3013000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox-api-proxy.cdn.mozilla.net/
    Source: firefox.exe, 0000000D.00000003.1771487535.0000020E4F315000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1769774544.0000020E4F321000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/706c7a85-cf23-442e-8a9
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://firefox-source-docs.mozilla.org/networking/dns/trr-skip-reasons.html#
    Source: firefox.exe, 0000000D.00000003.1916121431.0000020E576D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox.settings.services.mozilla.com
    Source: firefox.exe, 0000000D.00000003.1927863980.0000020E5763A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox.settings.services.mozilla.com/
    Source: firefox.exe, 0000000D.00000003.1951585023.0000020E5766A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
    Source: firefox.exe, 0000000D.00000003.1883902435.0000020E5712C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fpn.firefox.com/
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://fpn.firefox.com/browser?utm_source=firefox-desktop&utm_medium=referral&utm_campaign=about-pr
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://ftp.mozilla.org/pub/labs/devtools/adb-extension/#OS#/adb-extension-latest-#OS#.xpi
    Source: firefox.exe, 0000000D.00000003.1884195043.0000020E5844E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834819373.0000020E5844E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1952219975.0000020E518B8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1951416554.0000020E584DB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836260570.0000020E518B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885703548.0000020E518B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1897260070.0000020E518B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1883714104.0000020E5844E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3556417802.0000022EE8F12000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3555815281.000001C5F3013000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/
    Source: firefox.exe, 00000011.00000002.3555815281.000001C5F30C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
    Source: firefox.exe, 00000011.00000002.3555815281.000001C5F30C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
    Source: firefox.exe, 0000000D.00000003.1897260070.0000020E518B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1945108133.0000020E518AA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3556417802.0000022EE8F2F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3555815281.000001C5F3030000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=$apiKey&layout_variant=bas
    Source: firefox.exe, 0000000D.00000003.1943714250.0000020E59263000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1949172105.0000020E59263000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/career?utm_source=pocket-newtab
    Source: firefox.exe, 0000000D.00000003.1923191951.0000020E55E81000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904447045.0000020E55E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/career?utm_source=pocket-newtabL
    Source: firefox.exe, 0000000D.00000003.1943714250.0000020E59263000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1949172105.0000020E59263000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/entertainment?utm_source=pocket-newtab
    Source: firefox.exe, 0000000D.00000003.1923191951.0000020E55E81000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904447045.0000020E55E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/entertainment?utm_source=pocket-newtabC
    Source: firefox.exe, 0000000D.00000003.1923191951.0000020E55E81000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904447045.0000020E55E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/food?utm_source=pocket-newtabA
    Source: firefox.exe, 0000000D.00000003.1943714250.0000020E59263000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1949172105.0000020E59263000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/health?utm_source=pocket-newtab
    Source: firefox.exe, 0000000D.00000003.1923191951.0000020E55E81000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904447045.0000020E55E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/health?utm_source=pocket-newtabE
    Source: firefox.exe, 0000000D.00000003.1943714250.0000020E59263000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1949172105.0000020E59263000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/science?utm_source=pocket-newtab
    Source: firefox.exe, 0000000D.00000003.1923191951.0000020E55E81000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904447045.0000020E55E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/science?utm_source=pocket-newtabG
    Source: firefox.exe, 0000000D.00000003.1923191951.0000020E55E81000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904447045.0000020E55E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/self-improvement?utm_source=pocket-newtab?
    Source: firefox.exe, 0000000D.00000003.1943714250.0000020E59263000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1949172105.0000020E59263000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/technology?utm_source=pocket-newtab
    Source: firefox.exe, 0000000D.00000003.1923191951.0000020E55E81000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904447045.0000020E55E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/technology?utm_source=pocket-newtabN
    Source: firefox.exe, 00000011.00000002.3555815281.000001C5F30C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/trending?src=fx_new_tab
    Source: firefox.exe, 0000000D.00000003.1952219975.0000020E518B8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836260570.0000020E518B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885703548.0000020E518B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1897260070.0000020E518B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/trending?src=fx_new_tabL
    Source: firefox.exe, 0000000D.00000003.1943714250.0000020E59263000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1949172105.0000020E59263000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore?utm_source=pocket-newtab
    Source: firefox.exe, 0000000D.00000003.1923191951.0000020E55E81000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904447045.0000020E55E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore?utm_source=pocket-newtabI
    Source: firefox.exe, 0000000D.00000003.1929030617.0000020E55E40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/firefox/new_tab_learn_more
    Source: firefox.exe, 0000000D.00000003.1923191951.0000020E55E81000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904447045.0000020E55E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/firefox/new_tab_learn_more/
    Source: firefox.exe, 00000011.00000002.3555815281.000001C5F30C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/recommendations
    Source: firefox.exe, 0000000D.00000003.1952219975.0000020E518B8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836260570.0000020E518B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885703548.0000020E518B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1897260070.0000020E518B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/recommendationsS
    Source: firefox.exe, 0000000D.00000003.1952219975.0000020E518B8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836260570.0000020E518B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885703548.0000020E518B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1897260070.0000020E518B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/recommendationsS7
    Source: firefox.exe, 0000000D.00000003.1952219975.0000020E518B8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836260570.0000020E518B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885703548.0000020E518B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1897260070.0000020E518B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/v3/newtab/layout?version=1&consumer_key=$apiKey&layout_variant=basic
    Source: firefox.exe, 0000000D.00000003.1764875885.0000020E4F023000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1767386803.0000020E4F023000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/google/closure-compiler/issues/3177
    Source: firefox.exe, 0000000D.00000003.1858410437.0000020E4EEF5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1860099864.0000020E4EEF3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query-all.ts
    Source: firefox.exe, 0000000D.00000003.1858410437.0000020E4EEF5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1860099864.0000020E4EEF3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query.ts
    Source: firefox.exe, 0000000D.00000003.1767386803.0000020E4F023000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/lit/lit/issues/1266
    Source: firefox.exe, 0000000D.00000003.1767386803.0000020E4F023000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/microsoft/TypeScript/issues/338).
    Source: firefox.exe, 0000000D.00000003.1727553124.0000020E4DC00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727882457.0000020E4B71F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728511436.0000020E4B762000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728194404.0000020E4B740000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mozilla-services/screenshots
    Source: firefox.exe, 0000000D.00000003.1916121431.0000020E576D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/uuidjs/uuid#getrandomvalues-not-supported
    Source: firefox.exe, 0000000D.00000003.1904906383.0000020E515E4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1952783004.0000020E515E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/zertosh/loose-envify)
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://helper1.dap.cloudflareresearch.com/v02
    Source: firefox.exe, 0000000D.00000003.1835085588.0000020E560C8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1793216534.0000020E59072000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1886828536.0000020E507C4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1794906107.0000020E590CA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1918209761.0000020E507C4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884864530.0000020E560C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ib.absa.co.za/
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://ideas.mozilla.org/
    Source: firefox.exe, 0000000D.00000003.1950954182.0000020E58E55000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834625277.0000020E58E54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/apps/oldsyncS
    Source: firefox.exe, 0000000D.00000003.1908153836.0000020E4F8C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/apps/relay
    Source: firefox.exe, 0000000D.00000003.1950954182.0000020E58E55000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834625277.0000020E58E54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/cmd/H
    Source: firefox.exe, 0000000D.00000003.1950954182.0000020E58E55000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834625277.0000020E58E54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/cmd/HCX
    Source: firefox.exe, 0000000D.00000003.1950954182.0000020E58E55000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834625277.0000020E58E54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/ids/ecosystem_telemetryU
    Source: firefox.exe, 0000000D.00000003.1950954182.0000020E58E55000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834625277.0000020E58E54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/ids/ecosystem_telemetryUFj
    Source: firefox.exe, 0000000D.00000003.1928970981.0000020E55E63000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904447045.0000020E55E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://img-getpocket.cdn.mozilla.net/X
    Source: prefs-1.js.13.drString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
    Source: firefox.exe, 0000000D.00000003.1832439384.0000020E594BB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1921745518.0000020E5718C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org
    Source: firefox.exe, 0000000D.00000003.1952156789.0000020E518DE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836260570.0000020E518B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885703548.0000020E518B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1897260070.0000020E518B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3556417802.0000022EE8FC1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3555815281.000001C5F30F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit
    Source: firefox.exe, 0000000D.00000003.1921745518.0000020E5718C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1896023620.0000020E571CE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/firefox-desktop/events/1/3d438d04-33d8-4df5-bdd1-f78f4
    Source: firefox.exe, 0000000D.00000003.1832980851.0000020E5945C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1883902435.0000020E571CE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904238891.0000020E571D3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1896023620.0000020E571CE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/firefox-desktop/messaging-system/1/a5d6ec76-765c-4778-
    Source: firefox.exe, 0000000D.00000003.1883170882.0000020E5945C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1896023620.0000020E571CE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/firefox-desktop/metrics/1/fd9ebf77-de03-41fe-b93b-853f
    Source: firefox.exe, 0000000D.00000003.1840595396.0000020E59480000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1883003973.0000020E59480000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/messaging-system/undesired-events/1/3913612e-a099-494c
    Source: firefox.exe, 0000000D.00000003.1840595396.0000020E59480000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1883003973.0000020E59480000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/messaging-system/undesired-events/1/ab160d67-1676-4223
    Source: firefox.exe, 0000000D.00000003.1952219975.0000020E518B8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836260570.0000020E518B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885703548.0000020E518B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1897260070.0000020E518B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submits
    Source: firefox.exe, 0000000D.00000003.1767386803.0000020E4F023000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://infra.spec.whatwg.org/#ascii-whitespace
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://install.mozilla.org
    Source: firefox.exe, 0000000D.00000003.1925306562.0000020E4E9D4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1920023056.0000020E4E9D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2019-09/schema
    Source: firefox.exe, 0000000D.00000003.1912986547.0000020E4F447000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2019-09/schema.
    Source: firefox.exe, 0000000D.00000003.1912986547.0000020E4F447000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2019-09/schema./
    Source: firefox.exe, 0000000D.00000003.1912986547.0000020E4F447000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2020-12/schema/
    Source: firefox.exe, 0000000D.00000003.1912986547.0000020E4F447000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2020-12/schema/=
    Source: firefox.exe, 0000000D.00000003.1767386803.0000020E4F023000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lit.dev/docs/libraries/standalone-templates/#rendering-lit-html-templates
    Source: firefox.exe, 0000000D.00000003.1767386803.0000020E4F023000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lit.dev/docs/templates/directives/#stylemap
    Source: firefox.exe, 0000000D.00000003.1767386803.0000020E4F023000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lit.dev/docs/templates/expressions/#child-expressions)
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://location.services.mozilla.com/v1/country?key=%MOZILLA_API_KEY%
    Source: firefox.exe, 0000000D.00000003.1907644304.0000020E4FC12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://location.services.mozilla.com/v1/country?key=7e40f68c-7938-4c5d-9f95-e61647c213eb
    Source: firefox.exe, 0000000D.00000003.1884380055.0000020E561CB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1840950084.0000020E561CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lookerstudio.google.com/embed/reporting/
    Source: firefox.exe, 0000000D.00000003.1735061783.0000020E4C729000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1735306282.0000020E4C733000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1734202540.0000020E4C733000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.google.com/mail/?extsrc=mailto&url=%s
    Source: firefox.exe, 0000000D.00000003.1735061783.0000020E4C729000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1735306282.0000020E4C733000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1734202540.0000020E4C733000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.inbox.lv/compose?to=%s
    Source: firefox.exe, 0000000D.00000003.1735061783.0000020E4C729000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1735306282.0000020E4C733000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1734202540.0000020E4C733000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.yahoo.co.jp/compose/?To=%s
    Source: firefox.exe, 00000011.00000002.3555815281.000001C5F308F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://merino.services.mozilla.com/api/v1/suggest
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mitmdetection.services.mozilla.com/
    Source: firefox.exe, 0000000D.00000003.1883902435.0000020E5712C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/about
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/breach-details/
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/breach-stats?includeResolved=true
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/dashboard
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/preferences
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mozilla-ohttp-fakespot.fastly-edge.com/
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mozilla.cloudflare-dns.com/dns-query
    Source: firefox.exe, 0000000D.00000003.1840063070.0000020E4B548000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805451737.0000020E4B553000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805834509.0000020E4B554000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1810661559.0000020E4B54D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mozilla.org0/
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://normandy.cdn.mozilla.net/api/v1
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://oauth.accounts.firefox.com/v1
    Source: firefox.exe, 0000000D.00000003.1735061783.0000020E4C729000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1735306282.0000020E4C733000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1734202540.0000020E4C733000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://outlook.live.com/default.aspx?rru=compose&to=%s
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
    Source: firefox.exe, 0000000D.00000003.1735061783.0000020E4C729000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1735306282.0000020E4C733000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1734202540.0000020E4C733000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://poczta.interia.pl/mh/?mailto=%s
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://prod.ohttp-gateway.prod.webservices.mozgcp.net/ohttp-configs
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://profile.accounts.firefox.com/v1
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://profiler.firefox.com
    Source: firefox.exe, 0000000D.00000003.1896023620.0000020E571CE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://push.services.mozilla.com
    Source: firefox.exe, 0000000D.00000003.1883902435.0000020E571C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://push.services.mozilla.com/
    Source: firefox.exe, 0000000D.00000003.1952783004.0000020E515E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://redux.js.org/api-reference/store#subscribe(listener)
    Source: firefox.exe, 0000000D.00000003.1929245968.0000020E51D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://relay.firefox.com/accounts/profile/?utm_medium=firefox-desktop&utm_source=modal&utm_campaign
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://relay.firefox.com/api/v1/
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/diagnostic?site=
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%
    Source: firefox.exe, 0000000D.00000003.1906919701.0000020E4FF04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2&
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&p
    Source: firefox.exe, 0000000D.00000003.1884597621.0000020E56112000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/fullHashes:find?$ct=application/x-protobuf&key=%GOOGLE_SAFEBR
    Source: firefox.exe, 0000000D.00000003.1906919701.0000020E4FF04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/fullHashes:find?$ct=application/x-protobuf&key=AIzaSyC7jsptDS
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/threatHits?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSIN
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGL
    Source: firefox.exe, 0000000D.00000003.1906919701.0000020E4FF04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=AIzaSy
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_SAFEBROWSING_API_KEY%
    Source: firefox.exe, 0000000D.00000003.1728194404.0000020E4B740000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://screenshots.firefox.com/
    Source: firefox.exe, 0000000D.00000003.1791217118.0000020E4F9DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/abuse/report/addon/
    Source: firefox.exe, 0000000D.00000003.1884597621.0000020E56112000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1921976570.0000020E5611E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/addon
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/addon/
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/language-tools/?app=firefox&type=language&appversi
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/discovery/?lang=%LOCALE%&edition=%DISTRIBUTION%
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
    Source: firefox.exe, 0000000D.00000003.1884864530.0000020E560C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com
    Source: firefox.exe, 0000000D.00000003.1884864530.0000020E560C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2
    Source: firefox.exe, 0000000D.00000003.1884597621.0000020E56112000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
    Source: firefox.exe, 0000000D.00000003.1922082450.0000020E5610B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/downloads?client=navclient-auto-ffox&appver=118.0&pver=2.2
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2
    Source: firefox.exe, 0000000D.00000003.1884597621.0000020E56112000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/gethash?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
    Source: firefox.exe, 0000000D.00000003.1948101117.0000020E4E94A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1925567797.0000020E4E947000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1763681570.0000020E4E94A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://smartblock.firefox.etp/facebook.svg
    Source: firefox.exe, 0000000D.00000003.1948101117.0000020E4E94A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1925567797.0000020E4E947000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1763681570.0000020E4E94A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://smartblock.firefox.etp/play.svg
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://snippets.cdn.mozilla.net/%STARTPAGE_VERSION%/%NAME%/%VERSION%/%APPBUILDID%/%BUILD_TARGET%/%L
    Source: firefox.exe, 0000000D.00000003.1927273215.0000020E4E64C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com
    Source: firefox.exe, 0000000D.00000003.1918209761.0000020E507C4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3556417802.0000022EE8F12000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3555815281.000001C5F3013000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/
    Source: firefox.exe, 0000000D.00000003.1925836297.0000020E4E927000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/spocs
    Source: firefox.exe, 0000000D.00000003.1923191951.0000020E55E81000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904447045.0000020E55E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/spocs#
    Source: firefox.exe, 0000000D.00000003.1923191951.0000020E55E81000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904447045.0000020E55E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/spocs#l
    Source: firefox.exe, 0000000D.00000003.1952156789.0000020E518DE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1952219975.0000020E518B8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836260570.0000020E518B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885703548.0000020E518B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1897260070.0000020E518B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3556417802.0000022EE8FC1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3555815281.000001C5F30F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/user
    Source: firefox.exe, 00000011.00000002.3555815281.000001C5F30F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/user2
    Source: firefox.exe, 0000000D.00000003.1905565418.0000020E4FFFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://static.adsafeprotected.com/firefox-etp-js
    Source: firefox.exe, 0000000D.00000003.1926229745.0000020E4E6F4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1905565418.0000020E4FFFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://static.adsafeprotected.com/firefox-etp-pixel
    Source: firefox.exe, 0000000D.00000003.1908873080.0000020E4F6EA000.00000004.00000800.00020000.00000000.sdmp, places.sqlite-wal.13.drString found in binary or memory: https://support.mozilla.org
    Source: firefox.exe, 0000000D.00000003.1883902435.0000020E5712C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cryptominers-report
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/firefox-relay-integration
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/search-engine-removal
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
    Source: firefox.exe, 0000000D.00000003.1922241961.0000020E560E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1835085588.0000020E560C8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1916956970.0000020E560D1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1923401832.0000020E50726000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1927863980.0000020E5766A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884864530.0000020E560C8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1951585023.0000020E5766A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/118.0.1/WINNT/en-US/
    Source: firefox.exe, 0000000D.00000003.1906553727.0000020E4FF3C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/118.0.1/WINNT/en-US/firefox-relay-integration
    Source: firefox.exe, 0000000D.00000003.1838073372.0000020E5130E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1835085588.0000020E560C8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1893596571.0000020E5955F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1831820200.0000020E5955F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1916956970.0000020E560D1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1922294085.0000020E560D1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884864530.0000020E560C8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/captive-portal
    Source: firefox.exe, 0000000D.00000003.1912208249.0000020E4F69C000.00000004.00000800.00020000.00000000.sdmp, places.sqlite-wal.13.drString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
    Source: firefox.exe, 0000000D.00000003.1929517783.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1907644304.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/fix-video-audio-problems-firefox-windowsMediaPlatformDecoderNotFound
    Source: firefox.exe, 0000000D.00000003.1929517783.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1907644304.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/fix-video-audio-problems-firefox-windowsMediaWMFNeeded
    Source: firefox.exe, 0000000D.00000003.1857686757.0000020E508B5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1763959447.0000020E508B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings
    Source: firefox.exe, 0000000D.00000003.1946250271.0000020E509B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1838375195.0000020E509AA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1908357611.0000020E4F8AD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
    Source: places.sqlite-wal.13.drString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.
    Source: firefox.exe, 0000000D.00000003.1912208249.0000020E4F69C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
    Source: firefox.exe, 0000000D.00000003.1767386803.0000020E4F023000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tc39.github.io/ecma262/#sec-typeof-operator
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://token.services.mozilla.com/1.0/sync/1.5
    Source: firefox.exe, 0000000D.00000003.1907644304.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-2
    Source: firefox.exe, 0000000D.00000003.1907644304.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-3.1
    Source: firefox.exe, 0000000D.00000003.1907644304.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-4
    Source: firefox.exe, 0000000D.00000003.1907644304.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tools.ietf.org/html/rfc7515#appendix-C)
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://topsites.services.mozilla.com/cid/
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://tracking-protection-issues.herokuapp.com/new
    Source: firefox.exe, 0000000D.00000003.1883902435.0000020E5712C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://truecolors.firefox.com/
    Source: firefox.exe, 0000000D.00000003.1893641781.0000020E5952C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://twitter.com/
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://vpn.mozilla.org/?utm_source=firefox-browser&utm_medium=firefox-%CHANNEL%-browser&utm_campaig
    Source: firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://vpn.mozilla.org/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_campaign=about-pr
    Source: firefox.exe, 0000000D.00000003.1919535506.0000020E4F8AD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1908357611.0000020E4F8AD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://watch.sling.com/
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://webcompat.com/issues/new
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://webextensions.settings.services.mozilla.com/v1
    Source: firefox.exe, 0000000D.00000003.1904906383.0000020E515E4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1952783004.0000020E515E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://webpack.js.org/concepts/mode/)
    Source: firefox.exe, 0000000D.00000003.1769108784.0000020E4F077000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836260570.0000020E518B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885703548.0000020E518B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1897260070.0000020E518B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1768373471.0000020E4F1B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://weibo.com/
    Source: firefox.exe, 0000000D.00000003.1764875885.0000020E4F023000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1767386803.0000020E4F023000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://wicg.github.io/construct-stylesheets/#using-constructed-stylesheets).
    Source: firefox.exe, 0000000D.00000003.1893641781.0000020E5952C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/
    Source: firefox.exe, 0000000F.00000002.3556643045.000001DAFD5B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3556417802.0000022EE8FEF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3558782884.000001C5F3303000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
    Source: firefox.exe, 0000000D.00000003.1796408937.0000020E59098000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1863981506.0000020E59098000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1787468043.0000020E59098000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727553124.0000020E4DC00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728991408.0000020E4B783000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1908721726.0000020E4F867000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727882457.0000020E4B71F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728511436.0000020E4B762000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1791530720.0000020E4F94F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728194404.0000020E4B740000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1795205306.0000020E59098000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1860699500.0000020E59098000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1763681570.0000020E4E94A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/exec/obidos/external-search/
    Source: firefox.exe, 0000000D.00000003.1885751133.0000020E518B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836260570.0000020E518B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: https://www.digicert.com/CPS0
    Source: firefox.exe, 0000000F.00000002.3556643045.000001DAFD5B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3556417802.0000022EE8FEF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3558782884.000001C5F3303000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219
    Source: firefox.exe, 0000000D.00000003.1836260570.0000020E518B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885703548.0000020E518B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1897260070.0000020E518B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/
    Source: firefox.exe, 0000000D.00000003.1764085303.0000020E4EE56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1764975259.0000020E4F193000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/search
    Source: firefox.exe, 0000000D.00000003.1727553124.0000020E4DC00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728991408.0000020E4B783000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727882457.0000020E4B71F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728511436.0000020E4B762000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728194404.0000020E4B740000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/search?client=firefox&q=
    Source: firefox.exe, 0000000D.00000003.1796408937.0000020E59098000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1863981506.0000020E59098000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1787468043.0000020E59098000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727553124.0000020E4DC00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728991408.0000020E4B783000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1908721726.0000020E4F867000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727882457.0000020E4B71F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728511436.0000020E4B762000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1791530720.0000020E4F94F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728194404.0000020E4B740000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1795205306.0000020E59098000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1860699500.0000020E59098000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1763681570.0000020E4E94A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/search
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.googleapis.com/geolocation/v1/geolocate?key=%GOOGLE_LOCATION_SERVICE_API_KEY%
    Source: firefox.exe, 0000000D.00000003.1912690659.0000020E4F615000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mobilesuica.com/
    Source: firefox.exe, 0000000D.00000003.1908873080.0000020E4F6EA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1931997170.0000020E4EF4D000.00000004.00000800.00020000.00000000.sdmp, places.sqlite-wal.13.drString found in binary or memory: https://www.mozilla.org
    Source: firefox.exe, 0000000D.00000003.1883902435.0000020E5712C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/about/legal/terms/subscription-services/
    Source: firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/releasenotes/?utm_source=firefox-browser&utm_medi
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/tour/
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/geolocation/
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/new?reason=manual-update
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/notes
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/set-as-default/thanks/
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/xr/
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/privacy/subscription-services/
    Source: places.sqlite-wal.13.drString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.
    Source: firefox.exe, 0000000D.00000003.1912208249.0000020E4F69C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
    Source: firefox.exe, 0000000D.00000003.1771487535.0000020E4F315000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1770974373.0000020E4F341000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1769774544.0000020E4F321000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/legal/terms/mozilla/
    Source: firefox.exe, 0000000D.00000003.1927863980.0000020E57696000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/anything/?
    Source: places.sqlite-wal.13.drString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.
    Source: firefox.exe, 0000000D.00000003.1912208249.0000020E4F69C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
    Source: firefox.exe, 0000000D.00000003.1906553727.0000020E4FF3C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/about/legal/terms/subscription-services/
    Source: firefox.exe, 0000000D.00000003.1895422355.0000020E58EE6000.00000004.00000800.00020000.00000000.sdmp, targeting.snapshot.json.tmp.13.drString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/
    Source: firefox.exe, 0000000D.00000003.1950246289.0000020E58EBD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1930137090.0000020E4F412000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1912208249.0000020E4F69C000.00000004.00000800.00020000.00000000.sdmp, places.sqlite-wal.13.drString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
    Source: firefox.exe, 0000000D.00000003.1906553727.0000020E4FF3C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/subscription-services/
    Source: firefox.exe, 0000000D.00000003.1912208249.0000020E4F69C000.00000004.00000800.00020000.00000000.sdmp, places.sqlite-wal.13.drString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/android/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_c
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/ios/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_campa
    Source: firefox.exe, 0000000D.00000003.1927863980.0000020E57696000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/mobile/get-app/?utm_medium=firefox-desktop&utm_source=onboarding-mod
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html#crash-reporter
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html#health-report
    Source: firefox.exe, 0000000F.00000002.3556643045.000001DAFD5B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3556417802.0000022EE8FCE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3555815281.000001C5F30F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/
    Source: firefox.exe, 0000000D.00000003.1943714250.0000020E59263000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1949172105.0000020E59263000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/#suggest-relevant-content
    Source: firefox.exe, 0000000D.00000003.1923191951.0000020E55E81000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904447045.0000020E55E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/#suggest-relevant-contentP
    Source: firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_c
    Source: firefox.exe, 0000000D.00000003.1923191951.0000020E55E81000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904447045.0000020E55E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/V
    Source: firefox.exe, 0000000D.00000003.1950246289.0000020E58EBD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1912208249.0000020E4F69C000.00000004.00000800.00020000.00000000.sdmp, places.sqlite-wal.13.drString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
    Source: firefox.exe, 0000000D.00000003.1836260570.0000020E518B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885703548.0000020E518B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1897260070.0000020E518B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.olx.pl/
    Source: firefox.exe, 0000000D.00000003.1893641781.0000020E5952C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.reddit.com/
    Source: firefox.exe, 0000000D.00000003.1889000825.0000020E501BD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914442706.0000020E501BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.sling.com/
    Source: firefox.exe, 0000000D.00000003.1835085588.0000020E560C8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1916956970.0000020E560D1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1922294085.0000020E560D1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884864530.0000020E560C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.tiktok.com/
    Source: firefox.exe, 0000000D.00000003.1893641781.0000020E5952C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3556417802.0000022EE8F0A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3555815281.000001C5F300C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/
    Source: firefox.exe, 0000000D.00000003.1836260570.0000020E518B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885703548.0000020E518B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1897260070.0000020E518B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.zhihu.com/
    Source: firefox.exe, 0000000D.00000003.1929517783.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1907644304.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://xhr.spec.whatwg.org/#sync-warning
    Source: firefox.exe, 0000000D.00000003.1888208151.0000020E50587000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1919480898.0000020E4F8B3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1911960177.0000020E4F8B3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1908153836.0000020E4F8C8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1908357611.0000020E4F8AD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://youtube.com
    Source: firefox.exe, 0000000D.00000003.1918811764.0000020E502D8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/
    Source: recovery.jsonlz4.tmp.13.drString found in binary or memory: https://youtube.com/account?=
    Source: firefox.exe, 00000011.00000002.3558325082.000001C5F3170000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/sig
    Source: firefox.exe, 00000010.00000002.3555577868.0000022EE8D70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/sig)e
    Source: firefox.exe, 0000000F.00000002.3555551816.000001DAFD180000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/sig5
    Source: firefox.exe, 0000000D.00000003.1884864530.0000020E560C8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3556244905.000001DAFD230000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3555551816.000001DAFD184000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3556244905.000001DAFD23A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3554905936.0000022EE8C1A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3555577868.0000022EE8D74000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3554905936.0000022EE8C10000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3558325082.000001C5F3174000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3554987306.000001C5F2E5A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
    Source: firefox.exe, 00000011.00000002.3554987306.000001C5F2E50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd%
    Source: firefox.exe, 0000000B.00000002.1717069300.0000016B21F8A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000C.00000002.1723223827.0000023EFEC1F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd--no-default-browser
    Source: firefox.exe, 00000011.00000002.3554987306.000001C5F2E5A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd1
    Source: firefox.exe, 00000010.00000002.3554905936.0000022EE8C1A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd8a9(I1
    Source: firefox.exe, 0000000F.00000002.3556244905.000001DAFD230000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3555551816.000001DAFD184000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3555577868.0000022EE8D74000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3554905936.0000022EE8C10000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3558325082.000001C5F3174000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3554987306.000001C5F2E50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdMOZ_CRASHREPORTER_RE
    Source: firefox.exe, 0000000D.00000003.1887856245.0000020E5062B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwden
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
    Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
    Source: unknownNetwork traffic detected: HTTP traffic on port 49949 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
    Source: unknownNetwork traffic detected: HTTP traffic on port 49836 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49826 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
    Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
    Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
    Source: unknownNetwork traffic detected: HTTP traffic on port 49837 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49954 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49827 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
    Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
    Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
    Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
    Source: unknownNetwork traffic detected: HTTP traffic on port 49953 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49834 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49828 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49837
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
    Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49836
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49835
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49834
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49955
    Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49954
    Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49948 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49953
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49952
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
    Source: unknownNetwork traffic detected: HTTP traffic on port 49952 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
    Source: unknownNetwork traffic detected: HTTP traffic on port 49835 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49955 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49828
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49949
    Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49827
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49948
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49826
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49743 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.4:49744 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.4:49750 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49760 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49766 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49765 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49776 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49777 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 151.101.65.91:443 -> 192.168.2.4:49779 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49783 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49781 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49782 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49784 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49826 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49827 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49828 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49835 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49834 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49836 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49837 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49955 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49952 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49953 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49954 version: TLS 1.2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C8EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00C8EAFF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C8ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00C8ED6A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C8EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00C8EAFF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C7AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_00C7AA57
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CA9576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00CA9576

    System Summary

    barindex
    Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
    Source: file.exe, 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_44772467-4
    Source: file.exe, 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_66c07255-6
    Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_393982be-9
    Source: file.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_221ef95e-d
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_0000022EE8DF5BF7 NtQuerySystemInformation,16_2_0000022EE8DF5BF7
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_0000022EE9575772 NtQuerySystemInformation,16_2_0000022EE9575772
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C7D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_00C7D5EB
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C71201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00C71201
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C7E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00C7E8F6
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C820460_2_00C82046
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C180600_2_00C18060
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C782980_2_00C78298
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C4E4FF0_2_00C4E4FF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C4676B0_2_00C4676B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CA48730_2_00CA4873
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C1CAF00_2_00C1CAF0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C3CAA00_2_00C3CAA0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C2CC390_2_00C2CC39
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C46DD90_2_00C46DD9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C191C00_2_00C191C0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C2B1190_2_00C2B119
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C313940_2_00C31394
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C317060_2_00C31706
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C3781B0_2_00C3781B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C319B00_2_00C319B0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C2997D0_2_00C2997D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C179200_2_00C17920
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C37A4A0_2_00C37A4A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C37CA70_2_00C37CA7
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C31C770_2_00C31C77
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C49EEE0_2_00C49EEE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C9BE440_2_00C9BE44
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C31F320_2_00C31F32
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_0000022EE8DF5BF716_2_0000022EE8DF5BF7
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_0000022EE957577216_2_0000022EE9575772
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_0000022EE95757B216_2_0000022EE95757B2
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_0000022EE9575E9C16_2_0000022EE9575E9C
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 00C30A30 appears 45 times
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 00C2F9F2 appears 31 times
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: classification engineClassification label: mal72.troj.evad.winEXE@34/45@74/13
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C837B5 GetLastError,FormatMessageW,0_2_00C837B5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C710BF AdjustTokenPrivileges,CloseHandle,0_2_00C710BF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C716C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00C716C3
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C851CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00C851CD
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C7D4DC CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00C7D4DC
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C8648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_00C8648E
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C142A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00C142A2
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Local\Mozilla\Firefox\SkeletonUILock-c388d246Jump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7548:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7676:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7444:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7748:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7612:120:WilError_03
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Local\Temp\firefoxJump to behavior
    Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: firefox.exe, 0000000D.00000003.1950899700.0000020E58E69000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834586944.0000020E58E86000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834625277.0000020E58E54000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1883677996.0000020E58E86000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT * FROM events WHERE timestamp BETWEEN date(:dateFrom) AND date(:dateTo);
    Source: firefox.exe, 0000000D.00000003.1950899700.0000020E58E69000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834625277.0000020E58E54000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE events (id INTEGER PRIMARY KEY, type INTEGER NOT NULL, count INTEGER NOT NULL, timestamp DATE );
    Source: firefox.exe, 0000000D.00000003.1950899700.0000020E58E69000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834625277.0000020E58E54000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: INSERT INTO events (type, count, timestamp) VALUES (:type, 1, date(:date));
    Source: firefox.exe, 0000000D.00000003.1950899700.0000020E58E69000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834625277.0000020E58E54000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT timestamp FROM events ORDER BY timestamp ASC LIMIT 1;;
    Source: firefox.exe, 0000000D.00000003.1950899700.0000020E58E69000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834625277.0000020E58E54000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT timestamp FROM events ORDER BY timestamp ASC LIMIT 1;;Fy6
    Source: firefox.exe, 0000000D.00000003.1950899700.0000020E58E69000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834625277.0000020E58E54000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: UPDATE events SET count = count + 1 WHERE id = :id;-
    Source: firefox.exe, 0000000D.00000003.1950899700.0000020E58E69000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834625277.0000020E58E54000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT sum(count) FROM events;9'
    Source: firefox.exe, 0000000D.00000003.1950899700.0000020E58E69000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834625277.0000020E58E54000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT sum(count) FROM events;9
    Source: firefox.exe, 0000000D.00000003.1950899700.0000020E58E69000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834625277.0000020E58E54000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT * FROM events WHERE type = :type AND timestamp = date(:date);
    Source: file.exeReversingLabs: Detection: 47%
    Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /T
    Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /T
    Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /T
    Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /T
    Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /T
    Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
    Source: unknownProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2280 -parentBuildID 20230927232528 -prefsHandle 2224 -prefMapHandle 2208 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0d8a1b39-e660-4dac-b240-ef4997528783} 7848 "\\.\pipe\gecko-crash-server-pipe.7848" 20e3e06dd10 socket
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4236 -parentBuildID 20230927232528 -prefsHandle 4132 -prefMapHandle 4228 -prefsLen 26208 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {682e83fa-bff4-48c5-9ba5-30aa68b48bf0} 7848 "\\.\pipe\gecko-crash-server-pipe.7848" 20e3e083610 rdd
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5108 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5100 -prefMapHandle 5096 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c5983122-0af4-4d78-a131-0565779d2050} 7848 "\\.\pipe\gecko-crash-server-pipe.7848" 20e58f22910 utility
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blockingJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blockingJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2280 -parentBuildID 20230927232528 -prefsHandle 2224 -prefMapHandle 2208 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0d8a1b39-e660-4dac-b240-ef4997528783} 7848 "\\.\pipe\gecko-crash-server-pipe.7848" 20e3e06dd10 socketJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4236 -parentBuildID 20230927232528 -prefsHandle 4132 -prefMapHandle 4228 -prefsLen 26208 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {682e83fa-bff4-48c5-9ba5-30aa68b48bf0} 7848 "\\.\pipe\gecko-crash-server-pipe.7848" 20e3e083610 rddJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5108 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5100 -prefMapHandle 5096 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c5983122-0af4-4d78-a131-0565779d2050} 7848 "\\.\pipe\gecko-crash-server-pipe.7848" 20e58f22910 utilityJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdbV source: gmpopenh264.dll.tmp.13.dr
    Source: Binary string: pnrpnsp.pdb source: firefox.exe, 0000000D.00000003.1847095013.0000020E59701000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: npmproxy.pdbUGP source: firefox.exe, 0000000D.00000003.1847670361.0000020E59701000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: netprofm.pdb source: firefox.exe, 0000000D.00000003.1844284802.0000020E4B575000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdb source: gmpopenh264.dll.tmp.13.dr
    Source: Binary string: npmproxy.pdb source: firefox.exe, 0000000D.00000003.1847670361.0000020E59701000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: pnrpnsp.pdbUGP source: firefox.exe, 0000000D.00000003.1847095013.0000020E59701000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: netprofm.pdbUGP source: firefox.exe, 0000000D.00000003.1844284802.0000020E4B575000.00000004.00000020.00020000.00000000.sdmp
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C142DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00C142DE
    Source: gmpopenh264.dll.tmp.13.drStatic PE information: section name: .rodata
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C322CB push ds; ret 0_2_00C322E2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C30A76 push ecx; ret 0_2_00C30A89
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmpJump to dropped file
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)Jump to dropped file
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C2F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00C2F98E
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00CA1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00CA1C41
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\file.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-95801
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_0000022EE8DF5BF7 rdtsc 16_2_0000022EE8DF5BF7
    Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.6 %
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C7DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00C7DBBE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C868EE FindFirstFileW,FindClose,0_2_00C868EE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C8698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00C8698F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C7D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00C7D076
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C7D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00C7D3A9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C89642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00C89642
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C8979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00C8979D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C89B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00C89B2B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C85C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00C85C97
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C142DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00C142DE
    Source: firefox.exe, 00000010.00000002.3558877858.0000022EE9460000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll;
    Source: firefox.exe, 0000000F.00000002.3559578461.000001DAFD700000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll,x
    Source: firefox.exe, 0000000F.00000002.3556244905.000001DAFD23A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
    Source: firefox.exe, 00000010.00000002.3554905936.0000022EE8C1A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3558877858.0000022EE9460000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3558567592.000001C5F3180000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: firefox.exe, 0000000F.00000002.3558879081.000001DAFD612000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW : 2 : 34 : 1 : 1 : 0x20026 : 0x8 : %SystemRoot%\system32\mswsock.dll : : 1234191b-4bf7-4ca7-86e0-dfd7c32b5445
    Source: firefox.exe, 00000010.00000002.3558877858.0000022EE9460000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllG
    Source: firefox.exe, 0000000F.00000002.3559578461.000001DAFD700000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW&s
    Source: firefox.exe, 0000000F.00000002.3559578461.000001DAFD700000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll@b
    Source: firefox.exe, 0000000F.00000002.3559578461.000001DAFD700000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3558877858.0000022EE9460000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: firefox.exe, 00000011.00000002.3554987306.000001C5F2E5A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW06
    Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_0000022EE8DF5BF7 rdtsc 16_2_0000022EE8DF5BF7
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C8EAA2 BlockInput,0_2_00C8EAA2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C42622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00C42622
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C142DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00C142DE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C34CE8 mov eax, dword ptr fs:[00000030h]0_2_00C34CE8
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C70B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00C70B62
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C42622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00C42622
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C3083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00C3083F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C309D5 SetUnhandledExceptionFilter,0_2_00C309D5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C30C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00C30C21
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C71201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00C71201
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C52BA5 KiUserCallbackDispatcher,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00C52BA5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C7B226 SendInput,keybd_event,0_2_00C7B226
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C922DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_00C922DA
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C70B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00C70B62
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C71663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00C71663
    Source: file.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
    Source: file.exeBinary or memory string: Shell_TrayWnd
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C30698 cpuid 0_2_00C30698
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C88195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00C88195
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C6D27A GetUserNameW,0_2_00C6D27A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C4BB6F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00C4BB6F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C142DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00C142DE

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 7420, type: MEMORYSTR
    Source: file.exeBinary or memory string: WIN_81
    Source: file.exeBinary or memory string: WIN_XP
    Source: file.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
    Source: file.exeBinary or memory string: WIN_XPe
    Source: file.exeBinary or memory string: WIN_VISTA
    Source: file.exeBinary or memory string: WIN_7
    Source: file.exeBinary or memory string: WIN_8

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 7420, type: MEMORYSTR
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C91204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00C91204
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C91806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00C91806
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire Infrastructure2
    Valid Accounts
    1
    Windows Management Instrumentation
    1
    DLL Side-Loading
    1
    Exploitation for Privilege Escalation
    2
    Disable or Modify Tools
    21
    Input Capture
    2
    System Time Discovery
    Remote Services1
    Archive Collected Data
    2
    Ingress Tool Transfer
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault Accounts1
    Native API
    2
    Valid Accounts
    1
    DLL Side-Loading
    1
    Deobfuscate/Decode Files or Information
    LSASS Memory1
    Account Discovery
    Remote Desktop Protocol21
    Input Capture
    12
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    Extra Window Memory Injection
    2
    Obfuscated Files or Information
    Security Account Manager2
    File and Directory Discovery
    SMB/Windows Admin Shares3
    Clipboard Data
    3
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
    Valid Accounts
    1
    DLL Side-Loading
    NTDS16
    System Information Discovery
    Distributed Component Object ModelInput Capture4
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
    Access Token Manipulation
    1
    Extra Window Memory Injection
    LSA Secrets131
    Security Software Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
    Process Injection
    1
    Masquerading
    Cached Domain Credentials1
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
    Valid Accounts
    DCSync3
    Process Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    Virtualization/Sandbox Evasion
    Proc Filesystem1
    Application Window Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
    Access Token Manipulation
    /etc/passwd and /etc/shadow1
    System Owner/User Discovery
    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron2
    Process Injection
    Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1543670 Sample: file.exe Startdate: 28/10/2024 Architecture: WINDOWS Score: 72 45 youtube.com 2->45 47 youtube-ui.l.google.com 2->47 49 37 other IPs or domains 2->49 57 Multi AV Scanner detection for submitted file 2->57 59 Yara detected Credential Flusher 2->59 61 Binary is likely a compiled AutoIt script file 2->61 63 2 other signatures 2->63 8 file.exe 2->8         started        11 firefox.exe 1 2->11         started        signatures3 process4 signatures5 65 Binary is likely a compiled AutoIt script file 8->65 67 Found API chain indicative of sandbox detection 8->67 13 taskkill.exe 1 8->13         started        15 taskkill.exe 1 8->15         started        17 taskkill.exe 1 8->17         started        23 3 other processes 8->23 19 firefox.exe 3 215 11->19         started        process6 dnsIp7 25 conhost.exe 13->25         started        27 conhost.exe 15->27         started        29 conhost.exe 17->29         started        51 youtube.com 142.250.185.206, 443, 49738, 49739 GOOGLEUS United States 19->51 53 pki-goog.l.google.com 142.250.186.99, 49754, 80 GOOGLEUS United States 19->53 55 11 other IPs or domains 19->55 41 C:\Users\user\AppData\...\gmpopenh264.dll.tmp, PE32+ 19->41 dropped 43 C:\Users\user\...\gmpopenh264.dll (copy), PE32+ 19->43 dropped 31 firefox.exe 1 19->31         started        33 firefox.exe 1 19->33         started        35 firefox.exe 1 19->35         started        37 conhost.exe 23->37         started        39 conhost.exe 23->39         started        file8 process9

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    file.exe47%ReversingLabsWin32.Trojan.CredentialFlusher
    file.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)0%ReversingLabs
    C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l0%URL Reputationsafe
    https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%0%URL Reputationsafe
    https://datastudio.google.com/embed/reporting/0%URL Reputationsafe
    http://www.mozilla.com00%URL Reputationsafe
    https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.0%URL Reputationsafe
    https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl0%URL Reputationsafe
    https://merino.services.mozilla.com/api/v1/suggest0%URL Reputationsafe
    https://json-schema.org/draft/2019-09/schema.0%URL Reputationsafe
    https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect0%URL Reputationsafe
    https://spocs.getpocket.com/spocs0%URL Reputationsafe
    https://shavar.services.mozilla.com0%URL Reputationsafe
    https://completion.amazon.com/search/complete?q=0%URL Reputationsafe
    https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report0%URL Reputationsafe
    https://ads.stickyadstv.com/firefox-etp0%URL Reputationsafe
    https://identity.mozilla.com/ids/ecosystem_telemetryU0%URL Reputationsafe
    https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab0%URL Reputationsafe
    https://monitor.firefox.com/breach-details/0%URL Reputationsafe
    https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM0%URL Reputationsafe
    https://xhr.spec.whatwg.org/#sync-warning0%URL Reputationsafe
    https://services.addons.mozilla.org/api/v4/addons/addon/0%URL Reputationsafe
    https://tracking-protection-issues.herokuapp.com/new0%URL Reputationsafe
    https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report0%URL Reputationsafe
    https://content-signature-2.cdn.mozilla.net/0%URL Reputationsafe
    https://json-schema.org/draft/2020-12/schema/=0%URL Reputationsafe
    https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht0%URL Reputationsafe
    https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report0%URL Reputationsafe
    https://api.accounts.firefox.com/v10%URL Reputationsafe
    https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.20%URL Reputationsafe
    https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc0%URL Reputationsafe
    https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections0%URL Reputationsafe
    https://bugzilla.mozilla.org/show_bug.cgi?id=12836010%URL Reputationsafe
    https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield0%URL Reputationsafe
    https://MD8.mozilla.org/1/m0%URL Reputationsafe
    https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=0%URL Reputationsafe
    https://bugzilla.mozilla.org/show_bug.cgi?id=12662200%URL Reputationsafe
    https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-1520%URL Reputationsafe
    https://bugzilla.mo0%URL Reputationsafe
    https://mitmdetection.services.mozilla.com/0%URL Reputationsafe
    https://static.adsafeprotected.com/firefox-etp-js0%URL Reputationsafe
    https://shavar.services.mozilla.com/0%URL Reputationsafe
    https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture0%URL Reputationsafe
    https://spocs.getpocket.com/0%URL Reputationsafe
    https://services.addons.mozilla.org/api/v4/abuse/report/addon/0%URL Reputationsafe
    https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%0%URL Reputationsafe
    https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f0%URL Reputationsafe
    https://support.mozilla.org/products/firefoxgro.allizom.troppus.0%URL Reputationsafe
    https://monitor.firefox.com/user/breach-stats?includeResolved=true0%URL Reputationsafe
    https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report0%URL Reputationsafe
    http://a9.com/-/spec/opensearch/1.0/0%URL Reputationsafe
    https://safebrowsing.google.com/safebrowsing/diagnostic?site=0%URL Reputationsafe
    https://monitor.firefox.com/user/dashboard0%URL Reputationsafe
    https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID0%URL Reputationsafe
    https://monitor.firefox.com/about0%URL Reputationsafe
    https://coverage.mozilla.org0%URL Reputationsafe
    http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
    https://www.zhihu.com/0%URL Reputationsafe
    http://x1.c.lencr.org/00%URL Reputationsafe
    http://x1.i.lencr.org/00%URL Reputationsafe
    http://a9.com/-/spec/opensearch/1.1/0%URL Reputationsafe
    https://infra.spec.whatwg.org/#ascii-whitespace0%URL Reputationsafe
    https://blocked.cdn.mozilla.net/0%URL Reputationsafe
    https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored0%URL Reputationsafe
    https://json-schema.org/draft/2019-09/schema0%URL Reputationsafe
    http://developer.mozilla.org/en/docs/DOM:element.addEventListener0%URL Reputationsafe
    https://profiler.firefox.com0%URL Reputationsafe
    https://outlook.live.com/default.aspx?rru=compose&to=%s0%URL Reputationsafe
    https://identity.mozilla.com/apps/relay0%URL Reputationsafe
    https://mozilla.cloudflare-dns.com/dns-query0%URL Reputationsafe
    https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings20%URL Reputationsafe
    https://bugzilla.mozilla.org/show_bug.cgi?id=16784480%URL Reputationsafe
    https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg0%URL Reputationsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    example.org
    93.184.215.14
    truefalse
      unknown
      star-mini.c10r.facebook.com
      157.240.253.35
      truefalse
        unknown
        prod.classify-client.prod.webservices.mozgcp.net
        35.190.72.216
        truefalse
          unknown
          prod.balrog.prod.cloudops.mozgcp.net
          35.244.181.201
          truefalse
            unknown
            twitter.com
            104.244.42.193
            truefalse
              unknown
              prod.detectportal.prod.cloudops.mozgcp.net
              34.107.221.82
              truefalse
                unknown
                services.addons.mozilla.org
                151.101.65.91
                truefalse
                  unknown
                  dyna.wikimedia.org
                  185.15.59.224
                  truefalse
                    unknown
                    prod.remote-settings.prod.webservices.mozgcp.net
                    34.149.100.209
                    truefalse
                      unknown
                      pki-goog.l.google.com
                      142.250.186.99
                      truefalse
                        unknown
                        contile.services.mozilla.com
                        34.117.188.166
                        truefalse
                          unknown
                          youtube.com
                          142.250.185.206
                          truefalse
                            unknown
                            prod.content-signature-chains.prod.webservices.mozgcp.net
                            34.160.144.191
                            truefalse
                              unknown
                              youtube-ui.l.google.com
                              142.250.186.110
                              truefalse
                                unknown
                                us-west1.prod.sumo.prod.webservices.mozgcp.net
                                34.149.128.2
                                truefalse
                                  unknown
                                  reddit.map.fastly.net
                                  151.101.193.140
                                  truefalse
                                    unknown
                                    ipv4only.arpa
                                    192.0.0.170
                                    truefalse
                                      unknown
                                      prod.ads.prod.webservices.mozgcp.net
                                      34.117.188.166
                                      truefalse
                                        unknown
                                        push.services.mozilla.com
                                        34.107.243.93
                                        truefalse
                                          unknown
                                          normandy-cdn.services.mozilla.com
                                          35.201.103.21
                                          truefalse
                                            unknown
                                            telemetry-incoming.r53-2.services.mozilla.com
                                            34.120.208.123
                                            truefalse
                                              unknown
                                              www.reddit.com
                                              unknown
                                              unknownfalse
                                                unknown
                                                spocs.getpocket.com
                                                unknown
                                                unknownfalse
                                                  unknown
                                                  content-signature-2.cdn.mozilla.net
                                                  unknown
                                                  unknownfalse
                                                    unknown
                                                    support.mozilla.org
                                                    unknown
                                                    unknownfalse
                                                      unknown
                                                      firefox.settings.services.mozilla.com
                                                      unknown
                                                      unknownfalse
                                                        unknown
                                                        www.youtube.com
                                                        unknown
                                                        unknownfalse
                                                          unknown
                                                          www.facebook.com
                                                          unknown
                                                          unknownfalse
                                                            unknown
                                                            detectportal.firefox.com
                                                            unknown
                                                            unknownfalse
                                                              unknown
                                                              r10.o.lencr.org
                                                              unknown
                                                              unknownfalse
                                                                unknown
                                                                normandy.cdn.mozilla.net
                                                                unknown
                                                                unknownfalse
                                                                  unknown
                                                                  o.pki.goog
                                                                  unknown
                                                                  unknownfalse
                                                                    unknown
                                                                    shavar.services.mozilla.com
                                                                    unknown
                                                                    unknownfalse
                                                                      unknown
                                                                      www.wikipedia.org
                                                                      unknown
                                                                      unknownfalse
                                                                        unknown
                                                                        NameSourceMaliciousAntivirus DetectionReputation
                                                                        https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                          unknown
                                                                          https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_lfirefox.exe, 00000011.00000002.3555815281.000001C5F30C4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          https://datastudio.google.com/embed/reporting/firefox.exe, 0000000D.00000003.1884380055.0000020E561CB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1840950084.0000020E561CB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          http://www.mozilla.com0gmpopenh264.dll.tmp.13.drfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.firefox.exe, 0000000F.00000002.3556643045.000001DAFD5B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3556417802.0000022EE8FEF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3558782884.000001C5F3303000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecyclfirefox.exe, 0000000D.00000003.1764875885.0000020E4F023000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1767386803.0000020E4F023000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          https://merino.services.mozilla.com/api/v1/suggestfirefox.exe, 00000011.00000002.3555815281.000001C5F308F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          https://json-schema.org/draft/2019-09/schema.firefox.exe, 0000000D.00000003.1912986547.0000020E4F447000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          https://spocs.getpocket.com/user2firefox.exe, 00000011.00000002.3555815281.000001C5F30F6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            unknown
                                                                            https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protectfirefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                            • URL Reputation: safe
                                                                            unknown
                                                                            http://mozilla.ofirefox.exe, 0000000D.00000003.1863659170.0000020E4F728000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              unknown
                                                                              https://spocs.getpocket.com/spocsfirefox.exe, 0000000D.00000003.1925836297.0000020E4E927000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozillfirefox.exe, 0000000D.00000003.1885751133.0000020E518B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836260570.0000020E518B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                unknown
                                                                                https://shavar.services.mozilla.comfirefox.exe, 0000000D.00000003.1884864530.0000020E560C8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://completion.amazon.com/search/complete?q=firefox.exe, 0000000D.00000003.1727553124.0000020E4DC00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728991408.0000020E4B783000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727882457.0000020E4B71F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728511436.0000020E4B762000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728194404.0000020E4B740000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-reportfirefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://ads.stickyadstv.com/firefox-etpfirefox.exe, 0000000D.00000003.1926229745.0000020E4E6F4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1905565418.0000020E4FFFA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://identity.mozilla.com/ids/ecosystem_telemetryUfirefox.exe, 0000000D.00000003.1950954182.0000020E58E55000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834625277.0000020E58E54000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tabfirefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://monitor.firefox.com/breach-details/firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEMfirefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://xhr.spec.whatwg.org/#sync-warningfirefox.exe, 0000000D.00000003.1929517783.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1907644304.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://www.amazon.com/exec/obidos/external-search/firefox.exe, 0000000D.00000003.1796408937.0000020E59098000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1863981506.0000020E59098000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1787468043.0000020E59098000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727553124.0000020E4DC00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728991408.0000020E4B783000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1908721726.0000020E4F867000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727882457.0000020E4B71F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728511436.0000020E4B762000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1791530720.0000020E4F94F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728194404.0000020E4B740000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1795205306.0000020E59098000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1860699500.0000020E59098000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1763681570.0000020E4E94A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  unknown
                                                                                  http://r10.i.lencr.org/0$firefox.exe, 0000000D.00000003.1836990851.0000020E51380000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1908566467.0000020E4F881000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836990851.0000020E51370000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    unknown
                                                                                    https://github.com/mozilla-services/screenshotsfirefox.exe, 0000000D.00000003.1727553124.0000020E4DC00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727882457.0000020E4B71F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728511436.0000020E4B762000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728194404.0000020E4B740000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      unknown
                                                                                      https://services.addons.mozilla.org/api/v4/addons/addon/firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                      • URL Reputation: safe
                                                                                      unknown
                                                                                      https://tracking-protection-issues.herokuapp.com/newfirefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                      • URL Reputation: safe
                                                                                      unknown
                                                                                      https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-reportfirefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                      • URL Reputation: safe
                                                                                      unknown
                                                                                      https://youtube.com/firefox.exe, 0000000D.00000003.1918811764.0000020E502D8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        unknown
                                                                                        https://content-signature-2.cdn.mozilla.net/firefox.exe, 0000000D.00000003.1920023056.0000020E4E9C4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        • URL Reputation: safe
                                                                                        unknown
                                                                                        https://json-schema.org/draft/2020-12/schema/=firefox.exe, 0000000D.00000003.1912986547.0000020E4F447000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        • URL Reputation: safe
                                                                                        unknown
                                                                                        https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94firefox.exe, 0000000F.00000002.3556643045.000001DAFD5B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3556417802.0000022EE8FEF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3558782884.000001C5F3303000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drfalse
                                                                                          unknown
                                                                                          https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=htfirefox.exe, 0000000D.00000003.1927863980.0000020E57696000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          • URL Reputation: safe
                                                                                          unknown
                                                                                          https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-reportfirefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                          • URL Reputation: safe
                                                                                          unknown
                                                                                          https://api.accounts.firefox.com/v1firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                          • URL Reputation: safe
                                                                                          unknown
                                                                                          http://i.pki.goog/r1.crt0firefox.exe, 0000000D.00000003.1831820200.0000020E595DB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1922873013.0000020E55EC3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1908566467.0000020E4F881000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914442706.0000020E501B4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1833955414.0000020E58FCD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904447045.0000020E55EC3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885784955.0000020E513CD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1889000825.0000020E501B1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836356418.0000020E513CE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1944998101.0000020E55EC3000.00000004.00000800.00020000.00000000.sdmp, cert9.db.13.dr, cert9.db-journal.13.drfalse
                                                                                            unknown
                                                                                            https://www.amazon.com/firefox.exe, 0000000D.00000003.1893641781.0000020E5952C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              unknown
                                                                                              https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                unknown
                                                                                                https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2firefox.exe, 0000000D.00000003.1884597621.0000020E56112000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                • URL Reputation: safe
                                                                                                unknown
                                                                                                https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullScfirefox.exe, 0000000D.00000003.1929517783.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1907644304.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                • URL Reputation: safe
                                                                                                unknown
                                                                                                https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protectionsfirefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                • URL Reputation: safe
                                                                                                unknown
                                                                                                https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&ctafirefox.exe, 0000000F.00000002.3556643045.000001DAFD5B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3556417802.0000022EE8FEF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3558782884.000001C5F3303000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drfalse
                                                                                                  unknown
                                                                                                  http://r10.o.lencr.org0#firefox.exe, 0000000D.00000003.1836990851.0000020E51380000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1908566467.0000020E4F881000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836990851.0000020E51370000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    unknown
                                                                                                    http://ocsp.rootca1.amazontrust.com0:firefox.exe, 0000000D.00000003.1831820200.0000020E595DB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885784955.0000020E513CD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836356418.0000020E513CE000.00000004.00000800.00020000.00000000.sdmp, cert9.db.13.dr, cert9.db-journal.13.drfalse
                                                                                                      unknown
                                                                                                      https://www.youtube.com/firefox.exe, 0000000D.00000003.1893641781.0000020E5952C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3556417802.0000022EE8F0A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3555815281.000001C5F300C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        unknown
                                                                                                        https://bugzilla.mozilla.org/show_bug.cgi?id=1283601firefox.exe, 0000000D.00000003.1799416725.0000020E4E459000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shieldfirefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://MD8.mozilla.org/1/mfirefox.exe, 0000000D.00000003.1924797759.0000020E4EFD6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://addons.mozilla.org/firefox/addon/to-google-translate/firefox.exe, 0000000D.00000003.1927863980.0000020E5763A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          unknown
                                                                                                          https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=firefox.exe, 00000011.00000002.3555815281.000001C5F30C4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          • URL Reputation: safe
                                                                                                          unknown
                                                                                                          http://127.0.0.1:firefox.exe, 0000000D.00000003.1929245968.0000020E51D97000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                            unknown
                                                                                                            https://bugzilla.mozilla.org/show_bug.cgi?id=1266220firefox.exe, 0000000D.00000003.1799416725.0000020E4E459000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            • URL Reputation: safe
                                                                                                            unknown
                                                                                                            https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152firefox.exe, 0000000D.00000003.1791217118.0000020E4F9DF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            • URL Reputation: safe
                                                                                                            unknown
                                                                                                            https://bugzilla.mofirefox.exe, 0000000D.00000003.1907644304.0000020E4FC42000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            • URL Reputation: safe
                                                                                                            unknown
                                                                                                            https://mitmdetection.services.mozilla.com/firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                            • URL Reputation: safe
                                                                                                            unknown
                                                                                                            https://static.adsafeprotected.com/firefox-etp-jsfirefox.exe, 0000000D.00000003.1905565418.0000020E4FFFA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            • URL Reputation: safe
                                                                                                            unknown
                                                                                                            https://youtube.com/account?=recovery.jsonlz4.tmp.13.drfalse
                                                                                                              unknown
                                                                                                              https://shavar.services.mozilla.com/firefox.exe, 0000000D.00000003.1884864530.0000020E560C8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                              • URL Reputation: safe
                                                                                                              unknown
                                                                                                              http://crl3.digiRqfirefox.exe, 0000000D.00000003.1805451737.0000020E4B553000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805834509.0000020E4B554000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1810661559.0000020E4B54D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                unknown
                                                                                                                https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapturefirefox.exe, 0000000D.00000003.1907644304.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                • URL Reputation: safe
                                                                                                                unknown
                                                                                                                https://spocs.getpocket.com/firefox.exe, 0000000D.00000003.1918209761.0000020E507C4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3556417802.0000022EE8F12000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3555815281.000001C5F3013000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                • URL Reputation: safe
                                                                                                                unknown
                                                                                                                https://services.addons.mozilla.org/api/v4/abuse/report/addon/firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                • URL Reputation: safe
                                                                                                                unknown
                                                                                                                https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                • URL Reputation: safe
                                                                                                                unknown
                                                                                                                https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-ffirefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                • URL Reputation: safe
                                                                                                                unknown
                                                                                                                https://support.mozilla.org/products/firefoxgro.allizom.troppus.places.sqlite-wal.13.drfalse
                                                                                                                • URL Reputation: safe
                                                                                                                unknown
                                                                                                                https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_rfirefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                  unknown
                                                                                                                  http://crl.pki.goog/gsr1/gsr1.crl0;firefox.exe, 0000000D.00000003.1919828898.0000020E4F6F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1908873080.0000020E4F6EA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836990851.0000020E51359000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                    unknown
                                                                                                                    https://monitor.firefox.com/user/breach-stats?includeResolved=truefirefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                    • URL Reputation: safe
                                                                                                                    unknown
                                                                                                                    https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-reportfirefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                    • URL Reputation: safe
                                                                                                                    unknown
                                                                                                                    https://addons.mozilla.org/firefox.exe, 0000000D.00000003.1883902435.0000020E5712C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                      unknown
                                                                                                                      http://a9.com/-/spec/opensearch/1.0/firefox.exe, 0000000D.00000003.1947361310.0000020E4EF53000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1931997170.0000020E4EF53000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                      • URL Reputation: safe
                                                                                                                      unknown
                                                                                                                      https://safebrowsing.google.com/safebrowsing/diagnostic?site=firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                      • URL Reputation: safe
                                                                                                                      unknown
                                                                                                                      https://monitor.firefox.com/user/dashboardfirefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                      • URL Reputation: safe
                                                                                                                      unknown
                                                                                                                      https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_IDfirefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                      • URL Reputation: safe
                                                                                                                      unknown
                                                                                                                      https://monitor.firefox.com/aboutfirefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                      • URL Reputation: safe
                                                                                                                      unknown
                                                                                                                      http://mozilla.org/MPL/2.0/.firefox.exe, 0000000D.00000003.1840950084.0000020E561AD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849669408.0000020E4F9C8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1792497617.0000020E5902B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1797962557.0000020E4E4F4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1887682946.0000020E50653000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1865606048.0000020E55FC0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1866840665.0000020E4F945000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902226951.0000020E4E4D1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1791217118.0000020E4F9D9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1788249354.0000020E55FC2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1767746372.0000020E516E4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1791392609.0000020E4F9B8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1846667162.0000020E4E4F4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1867398153.0000020E4E48C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1867265155.0000020E4F7B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738840880.0000020E4E4FB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1797962557.0000020E4E4C3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738355446.0000020E4E4FC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884380055.0000020E561AD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1952284916.0000020E5185F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1866840665.0000020E4F94A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                        unknown
                                                                                                                        http://o.pki.goog/s/wr3/yvU0%firefox.exe, 0000000D.00000003.1836990851.0000020E51380000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1889000825.0000020E501A3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1922873013.0000020E55EC3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1908566467.0000020E4F881000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836990851.0000020E51370000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1833955414.0000020E58FCD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904447045.0000020E55EC3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914442706.0000020E501A4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1889000825.0000020E501BD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1944998101.0000020E55EC3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914442706.0000020E501BD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                          unknown
                                                                                                                          https://coverage.mozilla.orgfirefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                          • URL Reputation: safe
                                                                                                                          unknown
                                                                                                                          http://crl.thawte.com/ThawteTimestampingCA.crl0gmpopenh264.dll.tmp.13.drfalse
                                                                                                                          • URL Reputation: safe
                                                                                                                          unknown
                                                                                                                          https://www.zhihu.com/firefox.exe, 0000000D.00000003.1836260570.0000020E518B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885703548.0000020E518B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1897260070.0000020E518B7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                          • URL Reputation: safe
                                                                                                                          unknown
                                                                                                                          http://x1.c.lencr.org/0cert9.db.13.dr, cert9.db-journal.13.drfalse
                                                                                                                          • URL Reputation: safe
                                                                                                                          unknown
                                                                                                                          http://x1.i.lencr.org/0cert9.db.13.dr, cert9.db-journal.13.drfalse
                                                                                                                          • URL Reputation: safe
                                                                                                                          unknown
                                                                                                                          http://a9.com/-/spec/opensearch/1.1/firefox.exe, 0000000D.00000003.1947361310.0000020E4EF53000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1931997170.0000020E4EF53000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                          • URL Reputation: safe
                                                                                                                          unknown
                                                                                                                          https://infra.spec.whatwg.org/#ascii-whitespacefirefox.exe, 0000000D.00000003.1767386803.0000020E4F023000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                          • URL Reputation: safe
                                                                                                                          unknown
                                                                                                                          http://c.pki.goog/r/r1.crl0firefox.exe, 0000000D.00000003.1831820200.0000020E595DB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1922873013.0000020E55EC3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1908566467.0000020E4F881000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914442706.0000020E501B4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1833955414.0000020E58FCD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904447045.0000020E55EC3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885784955.0000020E513CD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1889000825.0000020E501B1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836356418.0000020E513CE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1944998101.0000020E55EC3000.00000004.00000800.00020000.00000000.sdmp, cert9.db.13.dr, cert9.db-journal.13.drfalse
                                                                                                                            unknown
                                                                                                                            https://blocked.cdn.mozilla.net/firefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                            • URL Reputation: safe
                                                                                                                            unknown
                                                                                                                            https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnoredfirefox.exe, 0000000D.00000003.1929517783.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1907644304.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                            • URL Reputation: safe
                                                                                                                            unknown
                                                                                                                            https://json-schema.org/draft/2019-09/schemafirefox.exe, 0000000D.00000003.1925306562.0000020E4E9D4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1920023056.0000020E4E9D0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                            • URL Reputation: safe
                                                                                                                            unknown
                                                                                                                            http://developer.mozilla.org/en/docs/DOM:element.addEventListenerfirefox.exe, 0000000D.00000003.1929517783.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1907644304.0000020E4FCB7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                            • URL Reputation: safe
                                                                                                                            unknown
                                                                                                                            https://profiler.firefox.comfirefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                            • URL Reputation: safe
                                                                                                                            unknown
                                                                                                                            https://outlook.live.com/default.aspx?rru=compose&to=%sfirefox.exe, 0000000D.00000003.1735061783.0000020E4C729000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1735306282.0000020E4C733000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1734202540.0000020E4C733000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                            • URL Reputation: safe
                                                                                                                            unknown
                                                                                                                            https://identity.mozilla.com/apps/relayfirefox.exe, 0000000D.00000003.1908153836.0000020E4F8C8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                            • URL Reputation: safe
                                                                                                                            unknown
                                                                                                                            https://mozilla.cloudflare-dns.com/dns-queryfirefox.exe, 0000000F.00000002.3556076961.000001DAFD1C0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3555842153.0000022EE8D80000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3558172732.000001C5F3120000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                            • URL Reputation: safe
                                                                                                                            unknown
                                                                                                                            http://i.pki.goog/wr3.crt0firefox.exe, 0000000D.00000003.1836990851.0000020E51380000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1889000825.0000020E501A3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1922873013.0000020E55EC3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1908566467.0000020E4F881000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1836990851.0000020E51370000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1833955414.0000020E58FCD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904447045.0000020E55EC3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914442706.0000020E501A4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1889000825.0000020E501BD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1944998101.0000020E55EC3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914442706.0000020E501BD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                              unknown
                                                                                                                              https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2firefox.exe, 0000000D.00000003.1946250271.0000020E509B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1838375195.0000020E509AA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1908357611.0000020E4F8AD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                              • URL Reputation: safe
                                                                                                                              unknown
                                                                                                                              https://bugzilla.mozilla.org/show_bug.cgi?id=1678448firefox.exe, 0000000D.00000003.1799348897.0000020E4E443000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1799416725.0000020E4E459000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                              • URL Reputation: safe
                                                                                                                              unknown
                                                                                                                              https://mail.yahoo.co.jp/compose/?To=%sfirefox.exe, 0000000D.00000003.1735061783.0000020E4C729000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1735306282.0000020E4C733000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1734202540.0000020E4C733000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                unknown
                                                                                                                                https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/firefox.exe, 0000000D.00000003.1927863980.0000020E5763A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                  unknown
                                                                                                                                  https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpgfirefox.exe, 0000000F.00000002.3556643045.000001DAFD5B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3556417802.0000022EE8FEF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3558782884.000001C5F3303000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drfalse
                                                                                                                                  • URL Reputation: safe
                                                                                                                                  unknown
                                                                                                                                  • No. of IPs < 25%
                                                                                                                                  • 25% < No. of IPs < 50%
                                                                                                                                  • 50% < No. of IPs < 75%
                                                                                                                                  • 75% < No. of IPs
                                                                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                  142.250.185.206
                                                                                                                                  youtube.comUnited States
                                                                                                                                  15169GOOGLEUSfalse
                                                                                                                                  34.149.100.209
                                                                                                                                  prod.remote-settings.prod.webservices.mozgcp.netUnited States
                                                                                                                                  2686ATGS-MMD-ASUSfalse
                                                                                                                                  34.107.243.93
                                                                                                                                  push.services.mozilla.comUnited States
                                                                                                                                  15169GOOGLEUSfalse
                                                                                                                                  151.101.65.91
                                                                                                                                  services.addons.mozilla.orgUnited States
                                                                                                                                  54113FASTLYUSfalse
                                                                                                                                  34.107.221.82
                                                                                                                                  prod.detectportal.prod.cloudops.mozgcp.netUnited States
                                                                                                                                  15169GOOGLEUSfalse
                                                                                                                                  35.244.181.201
                                                                                                                                  prod.balrog.prod.cloudops.mozgcp.netUnited States
                                                                                                                                  15169GOOGLEUSfalse
                                                                                                                                  34.117.188.166
                                                                                                                                  contile.services.mozilla.comUnited States
                                                                                                                                  139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfalse
                                                                                                                                  35.201.103.21
                                                                                                                                  normandy-cdn.services.mozilla.comUnited States
                                                                                                                                  15169GOOGLEUSfalse
                                                                                                                                  35.190.72.216
                                                                                                                                  prod.classify-client.prod.webservices.mozgcp.netUnited States
                                                                                                                                  15169GOOGLEUSfalse
                                                                                                                                  34.160.144.191
                                                                                                                                  prod.content-signature-chains.prod.webservices.mozgcp.netUnited States
                                                                                                                                  2686ATGS-MMD-ASUSfalse
                                                                                                                                  142.250.186.99
                                                                                                                                  pki-goog.l.google.comUnited States
                                                                                                                                  15169GOOGLEUSfalse
                                                                                                                                  34.120.208.123
                                                                                                                                  telemetry-incoming.r53-2.services.mozilla.comUnited States
                                                                                                                                  15169GOOGLEUSfalse
                                                                                                                                  IP
                                                                                                                                  127.0.0.1
                                                                                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                                                                                  Analysis ID:1543670
                                                                                                                                  Start date and time:2024-10-28 08:41:04 +01:00
                                                                                                                                  Joe Sandbox product:CloudBasic
                                                                                                                                  Overall analysis duration:0h 8m 21s
                                                                                                                                  Hypervisor based Inspection enabled:false
                                                                                                                                  Report type:full
                                                                                                                                  Cookbook file name:default.jbs
                                                                                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                                  Run name:Run with higher sleep bypass
                                                                                                                                  Number of analysed new started processes analysed:22
                                                                                                                                  Number of new started drivers analysed:0
                                                                                                                                  Number of existing processes analysed:0
                                                                                                                                  Number of existing drivers analysed:0
                                                                                                                                  Number of injected processes analysed:0
                                                                                                                                  Technologies:
                                                                                                                                  • HCA enabled
                                                                                                                                  • EGA enabled
                                                                                                                                  • AMSI enabled
                                                                                                                                  Analysis Mode:default
                                                                                                                                  Analysis stop reason:Timeout
                                                                                                                                  Sample name:file.exe
                                                                                                                                  Detection:MAL
                                                                                                                                  Classification:mal72.troj.evad.winEXE@34/45@74/13
                                                                                                                                  EGA Information:
                                                                                                                                  • Successful, ratio: 40%
                                                                                                                                  HCA Information:
                                                                                                                                  • Successful, ratio: 95%
                                                                                                                                  • Number of executed functions: 41
                                                                                                                                  • Number of non-executed functions: 308
                                                                                                                                  Cookbook Comments:
                                                                                                                                  • Found application associated with file extension: .exe
                                                                                                                                  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                                                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                                                                  • Excluded IPs from analysis (whitelisted): 52.32.18.233, 34.211.181.209, 34.218.156.47, 2.16.202.121, 95.101.54.131, 2.16.241.8, 2.16.241.15, 172.217.18.14, 2.22.61.57, 2.22.61.59, 142.250.185.234, 172.217.18.10, 142.250.185.238
                                                                                                                                  • Excluded domains from analysis (whitelisted): fs.microsoft.com, shavar.prod.mozaws.net, ciscobinary.openh264.org, slscr.update.microsoft.com, otelrules.azureedge.net, incoming.telemetry.mozilla.org, ctldl.windowsupdate.com, a17.rackcdn.com.mdc.edgesuite.net, detectportal.prod.mozaws.net, aus5.mozilla.org, o.lencr.edgesuite.net, fe3cr.delivery.mp.microsoft.com, a19.dscg10.akamai.net, ocsp.digicert.com, redirector.gvt1.com, a1887.dscq.akamai.net, safebrowsing.googleapis.com, location.services.mozilla.com
                                                                                                                                  • Execution Graph export aborted for target firefox.exe, PID 7848 because there are no executed function
                                                                                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                                                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                                                  • Report size getting too big, too many NtCreateFile calls found.
                                                                                                                                  • Report size getting too big, too many NtOpenFile calls found.
                                                                                                                                  • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                                                                                                  • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                                                  • VT rate limit hit for: file.exe
                                                                                                                                  No simulations
                                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                  34.117.188.166file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                    34.149.100.209file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                      34.160.144.191file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                        151.101.65.91file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                XlKQ797V2E.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                            services.addons.mozilla.orgfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.129.91
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.193.91
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.193.91
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.129.91
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                                                            example.orgfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                                                            twitter.comfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 104.244.42.193
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 104.244.42.65
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 104.244.42.65
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 104.244.42.129
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 104.244.42.193
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 104.244.42.129
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 104.244.42.129
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 104.244.42.1
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 104.244.42.129
                                                                                                                                                                                                            star-mini.c10r.facebook.comfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 157.240.0.35
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 157.240.0.35
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 157.240.0.35
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 157.240.252.35
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 157.240.251.35
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 157.240.252.35
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 157.240.253.35
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 157.240.251.35
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 157.240.253.35
                                                                                                                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                            GOOGLE-AS-APGoogleAsiaPacificPteLtdSGarm7.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                            • 34.117.135.29
                                                                                                                                                                                                            http://delivery.aima.in/KUJABQ?id=12442=dkxVUwNRDAEFTQIMBlVXAlpcUABXUAlUW1BaUQMHCQQMB1RQBwAKAwMHUlMBVQsKAQ1KQ1IQSlQGdQtdWUFRG0VcGVIFUQENDgMABgcGBwdVAAUOTwpEQRIPTRxSUlxcQ1UXGhwCUVhWH15bGXhmeSN7ZwZaBkxDUQ==&fl=XUQRE0FZFxpUVFlBRFJfQw1LQlhfTFFHAV0HV0NUX1haXgwXQQtZG1hDUBtYVBxaDF1TQQBMWEEPWQ==Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                            • 34.117.197.73
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                                                            FASTLYUSfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.129.91
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.193.91
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.193.91
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.129.91
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                                                            ATGS-MMD-ASUSla.bot.m68k.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                            • 33.130.33.195
                                                                                                                                                                                                            la.bot.arm.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                            • 51.248.47.66
                                                                                                                                                                                                            nabarm5.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                            • 56.103.158.186
                                                                                                                                                                                                            nklm68k.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                            • 57.22.4.36
                                                                                                                                                                                                            la.bot.m68k.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                            • 33.207.247.177
                                                                                                                                                                                                            la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                            • 34.137.136.252
                                                                                                                                                                                                            splm68k.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                            • 48.239.117.104
                                                                                                                                                                                                            nabmips.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                            • 57.1.135.252
                                                                                                                                                                                                            la.bot.arm5.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                            • 48.27.6.208
                                                                                                                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                            fb0aa01abe9d8e4037eb3473ca6e2dcafile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                                            • 151.101.65.91
                                                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                                            • 151.101.65.91
                                                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                                            • 151.101.65.91
                                                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                                            • 151.101.65.91
                                                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                                            • 151.101.65.91
                                                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                                            • 151.101.65.91
                                                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                                            • 151.101.65.91
                                                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                                            • 151.101.65.91
                                                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                                            • 151.101.65.91
                                                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                            C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmpfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                              C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):7813
                                                                                                                                                                                                                                                Entropy (8bit):5.179768647922258
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:192:QjMi/LccbhbVbTbfbRbObtbyEl7nIr2JA6WnSrDtTUd/SkDru:QYlcNhnzFSJor1BnSrDhUd/0
                                                                                                                                                                                                                                                MD5:FAC7990E032C96ABC487F9F947D9A13C
                                                                                                                                                                                                                                                SHA1:10BFAB6E9EF31A2BB10E6C6B867B6B6BEF7D7641
                                                                                                                                                                                                                                                SHA-256:3F031E47C9603530B0C450EA86637A5DA12AC833CD490E10971B94482C48F484
                                                                                                                                                                                                                                                SHA-512:F578139184404B21323E5679C93C78F460FBD61D641C0DF4477004C368F04925E2591A19C0446E5405C61F81A7CD0368D45D2743B85AC970F11693A9E624AF08
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:{"type":"uninstall","id":"5cffa8e0-c4b8-43a1-a99b-4e8629d16813","creationDate":"2024-10-28T09:29:19.567Z","version":4,"application":{"architecture":"x86-64","buildId":"20230927232528","name":"Firefox","version":"118.0.1","displayVersion":"118.0.1","vendor":"Mozilla","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","channel":"release"},"payload":{"otherInstalls":0},"clientId":"65e71c9e-6ac3-4903-9066-b134350de32c","environment":{"build":{"applicationId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","applicationName":"Firefox","architecture":"x86-64","buildId":"20230927232528","version":"118.0.1","vendor":"Mozilla","displayVersion":"118.0.1","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","updaterAvailable":true},"partner":{"distributionId":null,"distributionVersion":null,"partnerId":null,"distributor":null,"distributorChannel":null,"partnerNames":[]},"system":{"memoryMB":8191,"virtualMaxMB":134217728,"cpu":{"isWindowsSMode":false,"count":4,"cores":2,"vendor":"GenuineIntel","name":"I
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):7813
                                                                                                                                                                                                                                                Entropy (8bit):5.179768647922258
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:192:QjMi/LccbhbVbTbfbRbObtbyEl7nIr2JA6WnSrDtTUd/SkDru:QYlcNhnzFSJor1BnSrDhUd/0
                                                                                                                                                                                                                                                MD5:FAC7990E032C96ABC487F9F947D9A13C
                                                                                                                                                                                                                                                SHA1:10BFAB6E9EF31A2BB10E6C6B867B6B6BEF7D7641
                                                                                                                                                                                                                                                SHA-256:3F031E47C9603530B0C450EA86637A5DA12AC833CD490E10971B94482C48F484
                                                                                                                                                                                                                                                SHA-512:F578139184404B21323E5679C93C78F460FBD61D641C0DF4477004C368F04925E2591A19C0446E5405C61F81A7CD0368D45D2743B85AC970F11693A9E624AF08
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:{"type":"uninstall","id":"5cffa8e0-c4b8-43a1-a99b-4e8629d16813","creationDate":"2024-10-28T09:29:19.567Z","version":4,"application":{"architecture":"x86-64","buildId":"20230927232528","name":"Firefox","version":"118.0.1","displayVersion":"118.0.1","vendor":"Mozilla","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","channel":"release"},"payload":{"otherInstalls":0},"clientId":"65e71c9e-6ac3-4903-9066-b134350de32c","environment":{"build":{"applicationId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","applicationName":"Firefox","architecture":"x86-64","buildId":"20230927232528","version":"118.0.1","vendor":"Mozilla","displayVersion":"118.0.1","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","updaterAvailable":true},"partner":{"distributionId":null,"distributionVersion":null,"partnerId":null,"distributor":null,"distributorChannel":null,"partnerNames":[]},"system":{"memoryMB":8191,"virtualMaxMB":134217728,"cpu":{"isWindowsSMode":false,"count":4,"cores":2,"vendor":"GenuineIntel","name":"I
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):1249
                                                                                                                                                                                                                                                Entropy (8bit):4.925071535708349
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:24:YGVmGJsYt6iv1+ivl+ijJXn4Mj4xUz4+Eibw4DKe4lextS:YGVRJsY4y8ys4JXn4Mj4xUz4+Eik4Dxw
                                                                                                                                                                                                                                                MD5:2C92CCB6FDA5BAC277AD4D8AC73571A2
                                                                                                                                                                                                                                                SHA1:472A56643292661BE50FD8FF7DE9FE8B0976CBDD
                                                                                                                                                                                                                                                SHA-256:2848FA69678BE737A6523CFF837AE0D40C7065ABDDE42A9220A34FEF445FA929
                                                                                                                                                                                                                                                SHA-512:C73CE669B393E42E5FDA3E38630EF8CE53C4F825C08DD40C620241D9C01F56F32CFF19561BD37A3B332189325A6ABDDDED84DB981F3CBB390A3A1A452F4492F7
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:{"spocs":{"lastUpdated":1730107707647,"spocs":{"settings":{"feature_flags":{"collections":false,"spoc_v2":true},"spocsPerNewTabs":1,"domainAffinityParameterSets":{"default":{"combinedDomainFactor":0.5,"frequencyFactor":0.5,"itemScoreFactor":1,"multiDomainBoost":0,"perfectCombinedDomainScore":2,"perfectFrequencyVisits":10,"recencyFactor":0.5},"fully-personalized":{"combinedDomainFactor":0.5,"frequencyFactor":0.5,"itemScoreFactor":0.01,"multiDomainBoost":0,"perfectCombinedDomainScore":2,"perfectFrequencyVisits":10,"recencyFactor":0.5},"fully-personalized-domains":{"combinedDomainFactor":0.5,"frequencyFactor":0.5,"itemScoreFactor":0.01,"multiDomainBoost":0,"perfectCombinedDomainScore":10,"perfectFrequencyVisits":1,"recencyFactor":0.5}},"timeSegments":[{"id":"week-1","startTime":432000,"endTime":0,"weightPosition":1},{"id":"week-2","startTime":864000,"endTime":432000,"weightPosition":1},{"id":"week-3","startTime":1296000,"endTime":864000,"weightPosition":1},{"id":"week-4","startTime":17280
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):1249
                                                                                                                                                                                                                                                Entropy (8bit):4.925071535708349
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:24:YGVmGJsYt6iv1+ivl+ijJXn4Mj4xUz4+Eibw4DKe4lextS:YGVRJsY4y8ys4JXn4Mj4xUz4+Eik4Dxw
                                                                                                                                                                                                                                                MD5:2C92CCB6FDA5BAC277AD4D8AC73571A2
                                                                                                                                                                                                                                                SHA1:472A56643292661BE50FD8FF7DE9FE8B0976CBDD
                                                                                                                                                                                                                                                SHA-256:2848FA69678BE737A6523CFF837AE0D40C7065ABDDE42A9220A34FEF445FA929
                                                                                                                                                                                                                                                SHA-512:C73CE669B393E42E5FDA3E38630EF8CE53C4F825C08DD40C620241D9C01F56F32CFF19561BD37A3B332189325A6ABDDDED84DB981F3CBB390A3A1A452F4492F7
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:{"spocs":{"lastUpdated":1730107707647,"spocs":{"settings":{"feature_flags":{"collections":false,"spoc_v2":true},"spocsPerNewTabs":1,"domainAffinityParameterSets":{"default":{"combinedDomainFactor":0.5,"frequencyFactor":0.5,"itemScoreFactor":1,"multiDomainBoost":0,"perfectCombinedDomainScore":2,"perfectFrequencyVisits":10,"recencyFactor":0.5},"fully-personalized":{"combinedDomainFactor":0.5,"frequencyFactor":0.5,"itemScoreFactor":0.01,"multiDomainBoost":0,"perfectCombinedDomainScore":2,"perfectFrequencyVisits":10,"recencyFactor":0.5},"fully-personalized-domains":{"combinedDomainFactor":0.5,"frequencyFactor":0.5,"itemScoreFactor":0.01,"multiDomainBoost":0,"perfectCombinedDomainScore":10,"perfectFrequencyVisits":1,"recencyFactor":0.5}},"timeSegments":[{"id":"week-1","startTime":432000,"endTime":0,"weightPosition":1},{"id":"week-2","startTime":864000,"endTime":432000,"weightPosition":1},{"id":"week-3","startTime":1296000,"endTime":864000,"weightPosition":1},{"id":"week-4","startTime":17280
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:MS Windows icon resource - 1 icon, 16x16 with PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced, 24 bits/pixel
                                                                                                                                                                                                                                                Category:modified
                                                                                                                                                                                                                                                Size (bytes):490
                                                                                                                                                                                                                                                Entropy (8bit):7.246483341090937
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:12:l8v/7J2T+gwjz+vdzLSMO9mj253UT3BcHXhJo:82CgwS//O91iT3BUXh6
                                                                                                                                                                                                                                                MD5:BD9751DFFFEFFA2154CC5913489ED58C
                                                                                                                                                                                                                                                SHA1:1C9230053C45CA44883103A6ACFDF49AC53ABF45
                                                                                                                                                                                                                                                SHA-256:834C4F18E96CFDAA395246183DE76032F1B77886764CEEBE52F6A146FA4D4C3B
                                                                                                                                                                                                                                                SHA-512:01072F60F4B2489BB84639A6179A82A3EA90A31C1AD61D30EF27800C3114DB5E45662583E1C0B5382F51635DC14372EFC71DCD069999D6B21A5D256C70697790
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:.......................PNG........IHDR................a....IDAT8O...1P......p....d1.....v)......p.nXM.t.H.(.......B$..}_G.{.......:uN...=......s|.$...`0.....dl6.>>>p.\.v;z.......F.a:.2..D.V.....V..n...g.z.X..C...v.......=.H..d..P*...i.."...X,.B...h...xyy.V....I$..J%r....6....Z-:...P..J..........|>'...P.\&.....l6....N5...Z.x<.....h.z..'@...L&.F..'.Jq<...m6.OOO.....$..r:.......v..V..ze.\.p.R..t.Z.....r...B...3.B..0...T*E".p8.D0..`2.D.j...h..n...wF...........#......O....IEND.B`.
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):32768
                                                                                                                                                                                                                                                Entropy (8bit):0.4593089050301797
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:48:9SP0nUgwyZXYI65yFRX2D3GNTTfyn0Mk1iA:9SDKaIjo3UzyE1L
                                                                                                                                                                                                                                                MD5:D910AD167F0217587501FDCDB33CC544
                                                                                                                                                                                                                                                SHA1:2F57441CEFDC781011B53C1C5D29AC54835AFC1D
                                                                                                                                                                                                                                                SHA-256:E3699D9404A3FFC1AFF0CA8A3972DC0EF38BDAB927741E9F627C7C55CEA42E81
                                                                                                                                                                                                                                                SHA-512:F1871BF28FF25EE52BDB99C7A80AB715C7CAC164DCD2FD87E681168EE927FD2C5E80E03C91BB638D955A4627213BF575FF4D9EECAEDA7718C128CF2CE8F7CB3D
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:... ftypisom....isomiso2avc1mp41....free....mdat..........E...H..,. .#..x264 - core 152 r2851 ba24899 - H.264/MPEG-4 AVC codec - Copyleft 2003-2017 - http://www.videolan.org/x264.html - options: cabac=1 ref=3 deblock=1:0:0 analyse=0x3:0x113 me=hex subme=7 psy=1 psy_rd=1.00:0.00 mixed_ref=1 me_range=16 chroma_me=1 trellis=1 8x8dct=1 cqm=0 deadzone=21,11 fast_pskip=1 chroma_qp_offset=-2 threads=4 lookahead_threads=1 sliced_threads=0 nr=0 decimate=1 interlaced=0 bluray_compat=0 constrained_intra=0 bframes=3 b_pyramid=2 b_adapt=1 b_bias=0 direct=1 weightb=1 open_gop=0 weightp=2 keyint=250 keyint_min=25 scenecut=40 intra_refresh=0 rc_lookahead=40 rc=crf mbtree=1 crf=23.0 qcomp=0.60 qpmin=0 qpmax=69 qpstep=4 ip_ratio=1.40 aq=1:1.00......e...+...s|.kG3...'.u.."...,J.w.~.d\..(K....!.+..;....h....(.T.*...M......0..~L..8..B..A.y..R..,.zBP.';j.@.].w..........c......C=.'f....gI.$^.......m5V.L...{U..%V[....8......B..i..^,....:...,..5.m.%dA....moov...lmvhd...................(...........
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):453023
                                                                                                                                                                                                                                                Entropy (8bit):7.997718157581587
                                                                                                                                                                                                                                                Encrypted:true
                                                                                                                                                                                                                                                SSDEEP:12288:tESTeqTI2r4ZbCgUKWKNeRcPMb6qlV7hVZe3:tEsed2Xh9/bdzZe3
                                                                                                                                                                                                                                                MD5:85430BAED3398695717B0263807CF97C
                                                                                                                                                                                                                                                SHA1:FFFBEE923CEA216F50FCE5D54219A188A5100F41
                                                                                                                                                                                                                                                SHA-256:A9F4281F82B3579581C389E8583DC9F477C7FD0E20C9DFC91A2E611E21E3407E
                                                                                                                                                                                                                                                SHA-512:06511F1F6C6D44D076B3C593528C26A602348D9C41689DBF5FF716B671C3CA5756B12CB2E5869F836DEDCE27B1A5CFE79B93C707FD01F8E84B620923BB61B5F1
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:PK.........bN...R..........gmpopenh264.dll..|.E.0.=..I.....1....4f1q.`.........q.....'+....h*m{.z..o_.{w........$..($A!...|L...B&A2.s.{..Dd......c.U.U..9u.S...K.l`...../.d.-....|.....&....9......wn..x......i.#O.+.Y.l......+....,3.3f..\..c.SSS,............N...GG...F.'.&.:'.K.Z&.>.@.g..M...M.`...*.........ZR....^jg.G.Kb.o~va.....<Z..1.#.O.e.....D..X..i..$imBW..Q&.......P.....,M.,..:.c...-...\......*.....-i.K.I..4.a..6..*...Ov=...W..F.CH.>...a.'.x...#@f...d..u.1....OV.1o}....g.5.._.3.J.Hi.Z.ipM....b.Z....%.G..F................/..3.q..J.....o...%.g.N.*.}..).3.N%.!..q*........^I.m..~...6.#.~+.....A...I]r...x..*.<IYj....p0..`S.M@.E..f.=.;!.@.....E..E....... .0.n....Jd..d......uM.-.qI.lR..z..=}..r.D.XLZ....x.$..|c.1.cUkM.&.Qn]..a]t.h..*.!.6 7..Jd.DvKJ"Wgd*%n...w...Jni.inmr.@M.$'Z.s....#)%..Rs..:.h....R....\..t.6..'.g.........Uj+F.cr:|..!..K.W.Y...17......,....r.....>.N..3.R.Y.._\...Ir.DNJdM... .k...&V-....z.%...-...D..i..&...6....7.2T).>..0..%.&.
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):5488
                                                                                                                                                                                                                                                Entropy (8bit):3.306741128721085
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:24:8YdfjpALTIUx2dWoM15rLN8zmDYdfjpALswM+bpoqdWoM15rLFX1RgmVYdfjpALB:8YduIUgdwwzyYdu86BdwIUYdu8adwq1
                                                                                                                                                                                                                                                MD5:0C427723B2FEC1E7B70314020D78FEE9
                                                                                                                                                                                                                                                SHA1:B032DC539A686FA648348DEA7C40C0C160BB2CA4
                                                                                                                                                                                                                                                SHA-256:F3835FD1214C51CAA03725D90BE6F7C7BA3976CD6CCD4071FC9A11CF9B519291
                                                                                                                                                                                                                                                SHA-512:10BA161FD63AF3F8CD3CE43C24A5F696A83E43207ECD9E3E375AEA88FFB7FCC7E52E1F1C97CEC509BADB2D1F0906D7582800DB5496ACEDEAF7BEAB651A00577E
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:...................................FL..................F.@.. ...p.......#....)..........S...........................P.O. .:i.....+00.../C:\.....................1.....DW.V..PROGRA~1..t......O.I\Y@=....B...............J.....i...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....h.1.....CW.X..MOZILL~1..P......CW}W\Y@=............................>.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.....b.2..S..<W,. .firefox.exe.H......CW}W\Y@=..............................f.i.r.e.f.o.x...e.x.e.......[...............-.......Z.............W......C:\Program Files\Mozilla Firefox\firefox.exe....O.p.e.n. .a. .n.e.w. .b.r.o.w.s.e.r. .t.a.b.....-.n.e.w.-.t.a.b. .a.b.o.u.t.:.b.l.a.n.k.,.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.\.f.i.r.e.f.o.x...e.x.e.........%ProgramFiles%\Mozilla Firefox\firefox.exe................................................................................................................................................................................
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):5488
                                                                                                                                                                                                                                                Entropy (8bit):3.306741128721085
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:24:8YdfjpALTIUx2dWoM15rLN8zmDYdfjpALswM+bpoqdWoM15rLFX1RgmVYdfjpALB:8YduIUgdwwzyYdu86BdwIUYdu8adwq1
                                                                                                                                                                                                                                                MD5:0C427723B2FEC1E7B70314020D78FEE9
                                                                                                                                                                                                                                                SHA1:B032DC539A686FA648348DEA7C40C0C160BB2CA4
                                                                                                                                                                                                                                                SHA-256:F3835FD1214C51CAA03725D90BE6F7C7BA3976CD6CCD4071FC9A11CF9B519291
                                                                                                                                                                                                                                                SHA-512:10BA161FD63AF3F8CD3CE43C24A5F696A83E43207ECD9E3E375AEA88FFB7FCC7E52E1F1C97CEC509BADB2D1F0906D7582800DB5496ACEDEAF7BEAB651A00577E
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:...................................FL..................F.@.. ...p.......#....)..........S...........................P.O. .:i.....+00.../C:\.....................1.....DW.V..PROGRA~1..t......O.I\Y@=....B...............J.....i...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....h.1.....CW.X..MOZILL~1..P......CW}W\Y@=............................>.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.....b.2..S..<W,. .firefox.exe.H......CW}W\Y@=..............................f.i.r.e.f.o.x...e.x.e.......[...............-.......Z.............W......C:\Program Files\Mozilla Firefox\firefox.exe....O.p.e.n. .a. .n.e.w. .b.r.o.w.s.e.r. .t.a.b.....-.n.e.w.-.t.a.b. .a.b.o.u.t.:.b.l.a.n.k.,.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.\.f.i.r.e.f.o.x...e.x.e.........%ProgramFiles%\Mozilla Firefox\firefox.exe................................................................................................................................................................................
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):5488
                                                                                                                                                                                                                                                Entropy (8bit):3.306741128721085
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:24:8YdfjpALTIUx2dWoM15rLN8zmDYdfjpALswM+bpoqdWoM15rLFX1RgmVYdfjpALB:8YduIUgdwwzyYdu86BdwIUYdu8adwq1
                                                                                                                                                                                                                                                MD5:0C427723B2FEC1E7B70314020D78FEE9
                                                                                                                                                                                                                                                SHA1:B032DC539A686FA648348DEA7C40C0C160BB2CA4
                                                                                                                                                                                                                                                SHA-256:F3835FD1214C51CAA03725D90BE6F7C7BA3976CD6CCD4071FC9A11CF9B519291
                                                                                                                                                                                                                                                SHA-512:10BA161FD63AF3F8CD3CE43C24A5F696A83E43207ECD9E3E375AEA88FFB7FCC7E52E1F1C97CEC509BADB2D1F0906D7582800DB5496ACEDEAF7BEAB651A00577E
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:...................................FL..................F.@.. ...p.......#....)..........S...........................P.O. .:i.....+00.../C:\.....................1.....DW.V..PROGRA~1..t......O.I\Y@=....B...............J.....i...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....h.1.....CW.X..MOZILL~1..P......CW}W\Y@=............................>.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.....b.2..S..<W,. .firefox.exe.H......CW}W\Y@=..............................f.i.r.e.f.o.x...e.x.e.......[...............-.......Z.............W......C:\Program Files\Mozilla Firefox\firefox.exe....O.p.e.n. .a. .n.e.w. .b.r.o.w.s.e.r. .t.a.b.....-.n.e.w.-.t.a.b. .a.b.o.u.t.:.b.l.a.n.k.,.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.\.f.i.r.e.f.o.x...e.x.e.........%ProgramFiles%\Mozilla Firefox\firefox.exe................................................................................................................................................................................
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):5488
                                                                                                                                                                                                                                                Entropy (8bit):3.306741128721085
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:24:8YdfjpALTIUx2dWoM15rLN8zmDYdfjpALswM+bpoqdWoM15rLFX1RgmVYdfjpALB:8YduIUgdwwzyYdu86BdwIUYdu8adwq1
                                                                                                                                                                                                                                                MD5:0C427723B2FEC1E7B70314020D78FEE9
                                                                                                                                                                                                                                                SHA1:B032DC539A686FA648348DEA7C40C0C160BB2CA4
                                                                                                                                                                                                                                                SHA-256:F3835FD1214C51CAA03725D90BE6F7C7BA3976CD6CCD4071FC9A11CF9B519291
                                                                                                                                                                                                                                                SHA-512:10BA161FD63AF3F8CD3CE43C24A5F696A83E43207ECD9E3E375AEA88FFB7FCC7E52E1F1C97CEC509BADB2D1F0906D7582800DB5496ACEDEAF7BEAB651A00577E
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:...................................FL..................F.@.. ...p.......#....)..........S...........................P.O. .:i.....+00.../C:\.....................1.....DW.V..PROGRA~1..t......O.I\Y@=....B...............J.....i...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....h.1.....CW.X..MOZILL~1..P......CW}W\Y@=............................>.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.....b.2..S..<W,. .firefox.exe.H......CW}W\Y@=..............................f.i.r.e.f.o.x...e.x.e.......[...............-.......Z.............W......C:\Program Files\Mozilla Firefox\firefox.exe....O.p.e.n. .a. .n.e.w. .b.r.o.w.s.e.r. .t.a.b.....-.n.e.w.-.t.a.b. .a.b.o.u.t.:.b.l.a.n.k.,.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.\.f.i.r.e.f.o.x...e.x.e.........%ProgramFiles%\Mozilla Firefox\firefox.exe................................................................................................................................................................................
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):3621
                                                                                                                                                                                                                                                Entropy (8bit):4.926663670983152
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:48:YnSwkmrOfJNmPUFpOdwNIOdoWLEWLtkDLuuukx5FBvipA6kbbXjQthvLuhakNi9Z:8S+OfJQPUFpOdwNIOdYVjvYcXaNLla8P
                                                                                                                                                                                                                                                MD5:B88291DD492BAC9D6EC06880372FA275
                                                                                                                                                                                                                                                SHA1:CA2E79B93DCF9BAB3D796935E65125732B40ED9D
                                                                                                                                                                                                                                                SHA-256:72DF70D28ED6D8088DDAD4CCEFE2C55D36ED41AB1452C07EE8CD6FF357F503F3
                                                                                                                                                                                                                                                SHA-512:B075842FBE35D47960D2BCED5FA40E8ED9EB5D2659917C0F95AE8615ECEFF51A5D3850EEFE7753BE7130F27B4B9296B950559B4DA92370FB609A6DBD9BA20D82
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:{"csv-import-release-rollout":{"slug":"csv-import-release-rollout","branch":{"slug":"enable-csv-import","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"csvImport":true},"enabled":true,"featureId":"cm-csv-import"}]},"active":true,"enrollmentId":"c5d95379-f4ee-4629-a507-6f15a0e93cd4","experimentType":"rollout","source":"rs-loader","userFacingName":"CSV Import (Release Rollout)","userFacingDescription":"This rollout enables users to import logins from a CSV file from the about:logins page.","lastSeen":"2023-10-03T11:50:29.548Z","featureIds":["cm-csv-import"],"prefs":[{"name":"signon.management.page.fileImport.enabled","branch":"default","featureId":"cm-csv-import","variable":"csvImport","originalValue":false}],"isRollout":true},"serp-ad-telemetry-rollout":{"slug":"serp-ad-telemetry-rollout","branch":{"slug":"control","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pr
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):3621
                                                                                                                                                                                                                                                Entropy (8bit):4.926663670983152
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:48:YnSwkmrOfJNmPUFpOdwNIOdoWLEWLtkDLuuukx5FBvipA6kbbXjQthvLuhakNi9Z:8S+OfJQPUFpOdwNIOdYVjvYcXaNLla8P
                                                                                                                                                                                                                                                MD5:B88291DD492BAC9D6EC06880372FA275
                                                                                                                                                                                                                                                SHA1:CA2E79B93DCF9BAB3D796935E65125732B40ED9D
                                                                                                                                                                                                                                                SHA-256:72DF70D28ED6D8088DDAD4CCEFE2C55D36ED41AB1452C07EE8CD6FF357F503F3
                                                                                                                                                                                                                                                SHA-512:B075842FBE35D47960D2BCED5FA40E8ED9EB5D2659917C0F95AE8615ECEFF51A5D3850EEFE7753BE7130F27B4B9296B950559B4DA92370FB609A6DBD9BA20D82
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:{"csv-import-release-rollout":{"slug":"csv-import-release-rollout","branch":{"slug":"enable-csv-import","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"csvImport":true},"enabled":true,"featureId":"cm-csv-import"}]},"active":true,"enrollmentId":"c5d95379-f4ee-4629-a507-6f15a0e93cd4","experimentType":"rollout","source":"rs-loader","userFacingName":"CSV Import (Release Rollout)","userFacingDescription":"This rollout enables users to import logins from a CSV file from the about:logins page.","lastSeen":"2023-10-03T11:50:29.548Z","featureIds":["cm-csv-import"],"prefs":[{"name":"signon.management.page.fileImport.enabled","branch":"default","featureId":"cm-csv-import","variable":"csvImport","originalValue":false}],"isRollout":true},"serp-ad-telemetry-rollout":{"slug":"serp-ad-telemetry-rollout","branch":{"slug":"control","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pr
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:Mozilla lz4 compressed data, originally 23432 bytes
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):5312
                                                                                                                                                                                                                                                Entropy (8bit):6.615424734763731
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:96:V2YbKsKNU2xWrp327tGmD4wBON6h6cHaJVJuZMd0JGkkrw2D:VTx2x2t0FDJ4NpwZMd0EJws
                                                                                                                                                                                                                                                MD5:1B9C8056D3619CE5A8C59B0C09873F17
                                                                                                                                                                                                                                                SHA1:1015C630E1937AA63F6AB31743782ECB5D78CCD8
                                                                                                                                                                                                                                                SHA-256:A6AE5DE0733FED050AB570AD9374FF4593D554F695B5AE4E2495871D171D34A3
                                                                                                                                                                                                                                                SHA-512:B1DC9CC675D5476C270A2D5B214D3DF2B3856576ED7EFE92D9A606C2D9D34E781018902AE75CE9C1E25007BB7F8D8F7B52997E6F05B845EF44BAF22F614FE899
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:mozLz40..[....{"app-system-defaults":{"addon....formautofill@mozilla.org&..Gdependencies":[],"enabled":true,"lastModifiedTime":1695865283000,"loader":null,"path":s.....xpi","recommendationStateA...rootURI":"jar:file:///C:/Program%20Files/M.......refox/browser/features/...... !/...unInSafeMode..wsignedD...telemetryKey..7%40R...:1.0.1","version":"..`},"pic..#in.....T.n..w...........S.......(.[......0....0"},"screenshots..T.r.....[.......(.V....-39.......},"webcompat-reporter...Ofals..&.z.....[.......(.]....=1.5.............<.)....p....d......1.z.!18...5.....startupData...pX.astentL..!er...webRequest%..onBefore...[[{"incognitoi.UtabId..!yp...."main_frame"],"url...."*://login.microsoftonline.com/*","..@us/*L.dwindows...},["blocking"]],...Iimag...https://smartT.".f.....etp/facebook.svg",...Aplay*....8`script...P.....-....-testbed.herokuapp\.`shims_..3.jsh.bexampl|.......Pexten{..Q../?..s...S.J/_2..@&_3U..s7.addthis . ic...officialK......-angularjs/current/dist(..t.min.js...track.adB...net/s
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:Mozilla lz4 compressed data, originally 23432 bytes
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):5312
                                                                                                                                                                                                                                                Entropy (8bit):6.615424734763731
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:96:V2YbKsKNU2xWrp327tGmD4wBON6h6cHaJVJuZMd0JGkkrw2D:VTx2x2t0FDJ4NpwZMd0EJws
                                                                                                                                                                                                                                                MD5:1B9C8056D3619CE5A8C59B0C09873F17
                                                                                                                                                                                                                                                SHA1:1015C630E1937AA63F6AB31743782ECB5D78CCD8
                                                                                                                                                                                                                                                SHA-256:A6AE5DE0733FED050AB570AD9374FF4593D554F695B5AE4E2495871D171D34A3
                                                                                                                                                                                                                                                SHA-512:B1DC9CC675D5476C270A2D5B214D3DF2B3856576ED7EFE92D9A606C2D9D34E781018902AE75CE9C1E25007BB7F8D8F7B52997E6F05B845EF44BAF22F614FE899
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:mozLz40..[....{"app-system-defaults":{"addon....formautofill@mozilla.org&..Gdependencies":[],"enabled":true,"lastModifiedTime":1695865283000,"loader":null,"path":s.....xpi","recommendationStateA...rootURI":"jar:file:///C:/Program%20Files/M.......refox/browser/features/...... !/...unInSafeMode..wsignedD...telemetryKey..7%40R...:1.0.1","version":"..`},"pic..#in.....T.n..w...........S.......(.[......0....0"},"screenshots..T.r.....[.......(.V....-39.......},"webcompat-reporter...Ofals..&.z.....[.......(.]....=1.5.............<.)....p....d......1.z.!18...5.....startupData...pX.astentL..!er...webRequest%..onBefore...[[{"incognitoi.UtabId..!yp...."main_frame"],"url...."*://login.microsoftonline.com/*","..@us/*L.dwindows...},["blocking"]],...Iimag...https://smartT.".f.....etp/facebook.svg",...Aplay*....8`script...P.....-....-testbed.herokuapp\.`shims_..3.jsh.bexampl|.......Pexten{..Q../?..s...S.J/_2..@&_3U..s7.addthis . ic...officialK......-angularjs/current/dist(..t.min.js...track.adB...net/s
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):24
                                                                                                                                                                                                                                                Entropy (8bit):3.91829583405449
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:3:YWGifTJE6iHQ:YWGif9EE
                                                                                                                                                                                                                                                MD5:3088F0272D29FAA42ED452C5E8120B08
                                                                                                                                                                                                                                                SHA1:C72AA542EF60AFA3DF5DFE1F9FCC06C0B135BE23
                                                                                                                                                                                                                                                SHA-256:D587CEC944023447DC91BC5F71E2291711BA5ADD337464837909A26F34BC5A06
                                                                                                                                                                                                                                                SHA-512:B662414EDD6DEF8589304904263584847586ECCA0B0E6296FB3ADB2192D92FB48697C99BD27C4375D192150E3F99102702AF2391117FFF50A9763C74C193D798
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:{"schema":6,"addons":[]}
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):24
                                                                                                                                                                                                                                                Entropy (8bit):3.91829583405449
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:3:YWGifTJE6iHQ:YWGif9EE
                                                                                                                                                                                                                                                MD5:3088F0272D29FAA42ED452C5E8120B08
                                                                                                                                                                                                                                                SHA1:C72AA542EF60AFA3DF5DFE1F9FCC06C0B135BE23
                                                                                                                                                                                                                                                SHA-256:D587CEC944023447DC91BC5F71E2291711BA5ADD337464837909A26F34BC5A06
                                                                                                                                                                                                                                                SHA-512:B662414EDD6DEF8589304904263584847586ECCA0B0E6296FB3ADB2192D92FB48697C99BD27C4375D192150E3F99102702AF2391117FFF50A9763C74C193D798
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:{"schema":6,"addons":[]}
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 9, database pages 7, cookie 0x5, schema 4, UTF-8, version-valid-for 9
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):229376
                                                                                                                                                                                                                                                Entropy (8bit):0.8135973580921343
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:384:Sb1zkVmvQhyn+Zoz673kPgQsNlIMMz333JGN8j/LKXjl5suK:Sb+kIQsUMXCyTg
                                                                                                                                                                                                                                                MD5:BE4D8481713D67C06433A8C5B44AF339
                                                                                                                                                                                                                                                SHA1:56ABE53C0E330847FDC348C84616AA63463FBC80
                                                                                                                                                                                                                                                SHA-256:34C3D4940CB278F3779BC8AB427D6FE2CA2C01D48896BC65650962E32DD94FFC
                                                                                                                                                                                                                                                SHA-512:A1B9B9BE2FA38421BAF5B188BE5A4D089F66CC37A7EAD3039E0AD3E600E6900F4C071A72DDFB449F6C6141976506180DFD23586CB5EDDE796E285B5FE861DEE5
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:SQLite format 3......@ ..........................................................................j......z..{...{.{j{*z.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:SQLite Rollback Journal
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):229944
                                                                                                                                                                                                                                                Entropy (8bit):0.7305246930350132
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:384:7Gua5/3gQsNlIMMz333JGN8j/LKXVX1zkVmvQhyn+Zoz678:6wQsUMXCy5t
                                                                                                                                                                                                                                                MD5:7C33592B85A8ADFD8D0F6E8B809C50A1
                                                                                                                                                                                                                                                SHA1:16355E5AB635E173E3E93FE44B5A805C1A696327
                                                                                                                                                                                                                                                SHA-256:E7351764A6576E71495F792D09BB6CE4BDDA2309E5152774EA9ED09A47159F2E
                                                                                                                                                                                                                                                SHA-512:4F63DAD7A041B0E59CAAF351E71BE55495A21DCD540C3EA628981776A6EA23F95684C04D33512694CDBC020B9E36ED3804FA81C3A3180B80BEA983A05CFF42FC
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:.... .c...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R..R...........k..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):262144
                                                                                                                                                                                                                                                Entropy (8bit):0.04905391753567332
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:24:DLivwae+Q8Uu50xj0aWe9LxYkKA25Q5tvAA:D6wae+QtMImelekKDa5
                                                                                                                                                                                                                                                MD5:DD9D28E87ED57D16E65B14501B4E54D1
                                                                                                                                                                                                                                                SHA1:793839B47326441BE2D1336BA9A61C9B948C578D
                                                                                                                                                                                                                                                SHA-256:BB4E6C58C50BD6399ED70468C02B584595C29F010B66F864CD4D6B427FA365BC
                                                                                                                                                                                                                                                SHA-512:A2626F6A3CBADE62E38DA5987729D99830D0C6AA134D4A9E615026A5F18ACBB11A2C3C80917DAD76DA90ED5BAA9B0454D4A3C2DD04436735E78C974BA1D035B1
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:SQLite format 3......@ ..........................................................................j......|....~.}.}z}-|.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:Mozilla lz4 compressed data, originally 56 bytes
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):66
                                                                                                                                                                                                                                                Entropy (8bit):4.837595020998689
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:3:3fX/xH8IXl/I3v0lb7iioW:vXpH1RPXt
                                                                                                                                                                                                                                                MD5:A6338865EB252D0EF8FCF11FA9AF3F0D
                                                                                                                                                                                                                                                SHA1:CECDD4C4DCAE10C2FFC8EB938121B6231DE48CD3
                                                                                                                                                                                                                                                SHA-256:078648C042B9B08483CE246B7F01371072541A2E90D1BEB0C8009A6118CBD965
                                                                                                                                                                                                                                                SHA-512:D950227AC83F4E8246D73F9F35C19E88CE65D0CA5F1EF8CCBB02ED6EFC66B1B7E683E2BA0200279D7CA4B49831FD8C3CEB0584265B10ACCFF2611EC1CA8C0C6C
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:mozLz40.8.....{"v":1,"crashes":{},"countsByDay....rruptDate":null}
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:Mozilla lz4 compressed data, originally 56 bytes
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):66
                                                                                                                                                                                                                                                Entropy (8bit):4.837595020998689
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:3:3fX/xH8IXl/I3v0lb7iioW:vXpH1RPXt
                                                                                                                                                                                                                                                MD5:A6338865EB252D0EF8FCF11FA9AF3F0D
                                                                                                                                                                                                                                                SHA1:CECDD4C4DCAE10C2FFC8EB938121B6231DE48CD3
                                                                                                                                                                                                                                                SHA-256:078648C042B9B08483CE246B7F01371072541A2E90D1BEB0C8009A6118CBD965
                                                                                                                                                                                                                                                SHA-512:D950227AC83F4E8246D73F9F35C19E88CE65D0CA5F1EF8CCBB02ED6EFC66B1B7E683E2BA0200279D7CA4B49831FD8C3CEB0584265B10ACCFF2611EC1CA8C0C6C
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:mozLz40.8.....{"v":1,"crashes":{},"countsByDay....rruptDate":null}
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):36830
                                                                                                                                                                                                                                                Entropy (8bit):5.185924656884556
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:768:wI43DvfWXf4E6C4p4EC4Y4QfEWvM4B4QS4z4444XQ4U:wUfdvk
                                                                                                                                                                                                                                                MD5:5656BA69BD2966108A461AAE35F60226
                                                                                                                                                                                                                                                SHA1:9C2E5AE52D82CEA43C4A5FFF205A7700CF54D61C
                                                                                                                                                                                                                                                SHA-256:587596712960B26EAC18CB354CCD633FFDB218E374A9D59EFEA843914D7AB299
                                                                                                                                                                                                                                                SHA-512:38F715AD9156558B5D57CA2E75FB0FFE0C5C6728BD94484B8F15E090120DDD02DCE42DBC9CC7143AD6552460A5F3A40E577FAF1D76D5D40B25CDBE636F250054
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:{"schemaVersion":35,"addons":[{"id":"formautofill@mozilla.org","syncGUID":"{60024e8e-cfd0-41e5-965d-7128c7dcf0e8}","version":"1.0.1","type":"extension","loader":null,"updateURL":null,"installOrigins":null,"manifestVersion":2,"optionsURL":null,"optionsType":null,"optionsBrowserStyle":true,"aboutURL":null,"defaultLocale":{"name":"Form Autofill","creator":null,"developers":null,"translators":null,"contributors":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"embedderDisabled":false,"installDate":1695865283000,"updateDate":1695865283000,"applyBackgroundUpdates":1,"path":"C:\\Program Files\\Mozilla Firefox\\browser\\features\\formautofill@mozilla.org.xpi","skinnable":false,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"strictCompatibility":true,"locales":[],"targetApplications":[{"id":"toolkit@mozilla.org","minVersion":null,"maxVersion":null}],"targetPlatforms":[],"signedDate":null,"seen":true,"dependencies":[],"incognito":"
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):36830
                                                                                                                                                                                                                                                Entropy (8bit):5.185924656884556
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:768:wI43DvfWXf4E6C4p4EC4Y4QfEWvM4B4QS4z4444XQ4U:wUfdvk
                                                                                                                                                                                                                                                MD5:5656BA69BD2966108A461AAE35F60226
                                                                                                                                                                                                                                                SHA1:9C2E5AE52D82CEA43C4A5FFF205A7700CF54D61C
                                                                                                                                                                                                                                                SHA-256:587596712960B26EAC18CB354CCD633FFDB218E374A9D59EFEA843914D7AB299
                                                                                                                                                                                                                                                SHA-512:38F715AD9156558B5D57CA2E75FB0FFE0C5C6728BD94484B8F15E090120DDD02DCE42DBC9CC7143AD6552460A5F3A40E577FAF1D76D5D40B25CDBE636F250054
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:{"schemaVersion":35,"addons":[{"id":"formautofill@mozilla.org","syncGUID":"{60024e8e-cfd0-41e5-965d-7128c7dcf0e8}","version":"1.0.1","type":"extension","loader":null,"updateURL":null,"installOrigins":null,"manifestVersion":2,"optionsURL":null,"optionsType":null,"optionsBrowserStyle":true,"aboutURL":null,"defaultLocale":{"name":"Form Autofill","creator":null,"developers":null,"translators":null,"contributors":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"embedderDisabled":false,"installDate":1695865283000,"updateDate":1695865283000,"applyBackgroundUpdates":1,"path":"C:\\Program Files\\Mozilla Firefox\\browser\\features\\formautofill@mozilla.org.xpi","skinnable":false,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"strictCompatibility":true,"locales":[],"targetApplications":[{"id":"toolkit@mozilla.org","minVersion":null,"maxVersion":null}],"targetPlatforms":[],"signedDate":null,"seen":true,"dependencies":[],"incognito":"
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):32768
                                                                                                                                                                                                                                                Entropy (8bit):0.017262956703125623
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:3:G8lQs2TSlElQs2TtPRp//:G0QjSaQjrpX
                                                                                                                                                                                                                                                MD5:B7C14EC6110FA820CA6B65F5AEC85911
                                                                                                                                                                                                                                                SHA1:608EEB7488042453C9CA40F7E1398FC1A270F3F4
                                                                                                                                                                                                                                                SHA-256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
                                                                                                                                                                                                                                                SHA-512:D8D75760F29B1E27AC9430BC4F4FFCEC39F1590BE5AEF2BFB5A535850302E067C288EF59CF3B2C5751009A22A6957733F9F80FA18F2B0D33D90C068A3F08F3B0
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:..-.....................................8...5.....-.....................................8...5...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):1021904
                                                                                                                                                                                                                                                Entropy (8bit):6.648417932394748
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:12288:vYLdTfFKbNSjv92eFN+3wH+NYriA0Iq6lh6VawYIpAvwHN/Uf1h47HAfg1oet:vYLdTZ923NYrjwNpgwef1hzfg1x
                                                                                                                                                                                                                                                MD5:FE3355639648C417E8307C6D051E3E37
                                                                                                                                                                                                                                                SHA1:F54602D4B4778DA21BC97C7238FC66AA68C8EE34
                                                                                                                                                                                                                                                SHA-256:1ED7877024BE63A049DA98733FD282C16BD620530A4FB580DACEC3A78ACE914E
                                                                                                                                                                                                                                                SHA-512:8F4030BB2464B98ECCBEA6F06EB186D7216932702D94F6B84C56419E9CF65A18309711AB342D1513BF85AED402BC3535A70DB4395874828F0D35C278DD2EAC9C
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                Joe Sandbox View:
                                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......NH...)...)...)..eM...)..eM...)..eM..)..eM...)...)..i)..XA...)..XA..;)..XA...)...)..g)..cA...)..cA...)..Rich.)..........PE..d....z\.........." .....t................................................................`.........................................P...,...|...(............P...H...z.................T...........................0...................p............................text...$s.......t.................. ..`.rdata...~...........x..............@..@.data....3..........................@....pdata...H...P...J..................@..@.rodata..............^..............@..@.reloc...............j..............@..B........................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):1021904
                                                                                                                                                                                                                                                Entropy (8bit):6.648417932394748
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:12288:vYLdTfFKbNSjv92eFN+3wH+NYriA0Iq6lh6VawYIpAvwHN/Uf1h47HAfg1oet:vYLdTZ923NYrjwNpgwef1hzfg1x
                                                                                                                                                                                                                                                MD5:FE3355639648C417E8307C6D051E3E37
                                                                                                                                                                                                                                                SHA1:F54602D4B4778DA21BC97C7238FC66AA68C8EE34
                                                                                                                                                                                                                                                SHA-256:1ED7877024BE63A049DA98733FD282C16BD620530A4FB580DACEC3A78ACE914E
                                                                                                                                                                                                                                                SHA-512:8F4030BB2464B98ECCBEA6F06EB186D7216932702D94F6B84C56419E9CF65A18309711AB342D1513BF85AED402BC3535A70DB4395874828F0D35C278DD2EAC9C
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                Joe Sandbox View:
                                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......NH...)...)...)..eM...)..eM...)..eM..)..eM...)...)..i)..XA...)..XA..;)..XA...)...)..g)..cA...)..cA...)..Rich.)..........PE..d....z\.........." .....t................................................................`.........................................P...,...|...(............P...H...z.................T...........................0...................p............................text...$s.......t.................. ..`.rdata...~...........x..............@..@.data....3..........................@....pdata...H...P...J..................@..@.rodata..............^..............@..@.reloc...............j..............@..B........................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:ASCII text
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):116
                                                                                                                                                                                                                                                Entropy (8bit):4.968220104601006
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:3:C3OuN9RAM7VDXcEzq+rEakOvTMBv+FdBAIABv+FEn:0BDUmHlvAWeWEn
                                                                                                                                                                                                                                                MD5:3D33CDC0B3D281E67DD52E14435DD04F
                                                                                                                                                                                                                                                SHA1:4DB88689282FD4F9E9E6AB95FCBB23DF6E6485DB
                                                                                                                                                                                                                                                SHA-256:F526E9F98841D987606EFEAFF7F3E017BA9FD516C4BE83890C7F9A093EA4C47B
                                                                                                                                                                                                                                                SHA-512:A4A96743332CC8EF0F86BC2E6122618BFC75ED46781DADBAC9E580CD73DF89E74738638A2CCCB4CAA4CBBF393D771D7F2C73F825737CDB247362450A0D4A4BC1
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:Name: gmpopenh264.Description: GMP Plugin for OpenH264..Version: 1.8.1.APIs: encode-video[h264], decode-video[h264].
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:ASCII text
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):116
                                                                                                                                                                                                                                                Entropy (8bit):4.968220104601006
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:3:C3OuN9RAM7VDXcEzq+rEakOvTMBv+FdBAIABv+FEn:0BDUmHlvAWeWEn
                                                                                                                                                                                                                                                MD5:3D33CDC0B3D281E67DD52E14435DD04F
                                                                                                                                                                                                                                                SHA1:4DB88689282FD4F9E9E6AB95FCBB23DF6E6485DB
                                                                                                                                                                                                                                                SHA-256:F526E9F98841D987606EFEAFF7F3E017BA9FD516C4BE83890C7F9A093EA4C47B
                                                                                                                                                                                                                                                SHA-512:A4A96743332CC8EF0F86BC2E6122618BFC75ED46781DADBAC9E580CD73DF89E74738638A2CCCB4CAA4CBBF393D771D7F2C73F825737CDB247362450A0D4A4BC1
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:Name: gmpopenh264.Description: GMP Plugin for OpenH264..Version: 1.8.1.APIs: encode-video[h264], decode-video[h264].
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):98304
                                                                                                                                                                                                                                                Entropy (8bit):0.0733097054177114
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:12:DBl/A0OWla0mwPxRymgObsCVR45wcYR4fmnsCVR4zkiZU:DLhesh7Owd4+jiZU
                                                                                                                                                                                                                                                MD5:989EF55EF17DAAD1A39485ECF49F775C
                                                                                                                                                                                                                                                SHA1:C024E8F59F799FCF5E44D0AA211B51B358368B9C
                                                                                                                                                                                                                                                SHA-256:6BACA6A1DF7878403354E5A91E0EBC58C5EAE96A4CA2DE1C96C1BB204C70402D
                                                                                                                                                                                                                                                SHA-512:4B7F07A4CF8D8C75F8A79C8AE51F40B4CD43360079CAC6344C4FB1F0C9E6DF64DE652F15B2CA14EFA693F99C5EB0D551C59E79AC4CC1077DD5F89CD77FE54749
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:SQLite format 3......@ ..........................................................................j......~s..F~s........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):32768
                                                                                                                                                                                                                                                Entropy (8bit):0.039873451571426154
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:3:GHlhV+Jg/40d46ulhV+Jg/40d46blol8a9//Ylll4llqlyllel4lt:G7V+FxRV+Fx0GL9XIwlio
                                                                                                                                                                                                                                                MD5:8EE7F07653AD103151471E965039202A
                                                                                                                                                                                                                                                SHA1:38613E227FE5A75E939A09E29B9335EF4EC32C7D
                                                                                                                                                                                                                                                SHA-256:F086AE9BC0FCE36F64A5745AC72EC6EBCD84CE2472B47C33F1FCCD19C1BE2222
                                                                                                                                                                                                                                                SHA-512:B116EC65C9544E052C0CB55F9BA125E5C1FFC655C3330FFCA70299A600B3532A7D66C6912665A0CFB24D41FC38C2BD2C0D1A6CF85D0483067F44FE9DD8B3F4EE
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:..-.........................i.S..[.Qx]...sLu....-.........................i.S..[.Qx]...sLu..........................................................'...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:SQLite Write-Ahead Log, version 3007000
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):163992
                                                                                                                                                                                                                                                Entropy (8bit):0.11812709278426026
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:24:KufkJLxsZ+29kjxsMltTAUCF2QWUCZ7CCQE/TKCbCMxsaxY+JwlPVZ2i7+:FMHQAJtUnWdU+RVxqPZk
                                                                                                                                                                                                                                                MD5:03CA6E8ECD1594991AB2478C288BB758
                                                                                                                                                                                                                                                SHA1:C920E0A906ACA75AB493EA80D025E94E04611867
                                                                                                                                                                                                                                                SHA-256:43D9D7BD0949FE468B9D76694B7BC0F7571801CBCA589627379F4C21BE15FEF0
                                                                                                                                                                                                                                                SHA-512:0171EF805159CC122E1B4D9FAFF84D90DCC636E34299BBD9405B0C9DE24CC58937DFA5D65629C67DCCC93B9305449D302429E66DFD48A131FA2EA73DC5DB894E
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:7....-............[.Qx].."..J.Z...........[.Qx]...ep....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:ASCII text, with very long lines (1809), with CRLF line terminators
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):13254
                                                                                                                                                                                                                                                Entropy (8bit):5.493142708176824
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:192:qnaRtLYbBp6Chj4qyaaXB6KjCNVF5RfGNBw8dBSl:vegqDYuXcwm0
                                                                                                                                                                                                                                                MD5:1406E8F5D9F8E5834DC1297682F00657
                                                                                                                                                                                                                                                SHA1:C7186206D57D05AAAC3F0731150D6E5CA2DB835A
                                                                                                                                                                                                                                                SHA-256:7D3CA4F8D7EB58CC7473AF53ECC4BEE6768CD7ADB5AC25FD33A0E1BE0C3517B2
                                                                                                                                                                                                                                                SHA-512:0E5ACE619EB37BAA81715FA52CF050C29224F8F71486D1EAFFEE4E5102F1037F0F6F0AD852DBF867FAFF9BA3BA984BAB913FBDB2E805D0714D6B8EBFA22EDF2B
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:// Mozilla User Preferences....// DO NOT EDIT THIS FILE...//..// If you make changes to this file while the application is running,..// the changes will be overwritten when the application exits...//..// To change a preference value, you can either:..// - modify it via the UI (e.g. via about:config in the browser); or..// - set it within a user.js file in your profile.....user_pref("app.normandy.first_run", false);..user_pref("app.normandy.migrationsApplied", 12);..user_pref("app.normandy.user_id", "57f16a19-e119-4073-bf01-28f88011f783");..user_pref("app.update.auto.migrated", true);..user_pref("app.update.background.rolledout", true);..user_pref("app.update.backgroundErrors", 2);..user_pref("app.update.lastUpdateTime.addon-background-update-timer", 1730107730);..user_pref("app.update.lastUpdateTime.background-update-timer", 1730107730);..user_pref("app.update.lastUpdateTime.browser-cleanup-thumbnails", 1730107730);..user_pref("app.update.lastUpdateTime.recipe-client-addon-run", 173010
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:ASCII text, with very long lines (1809), with CRLF line terminators
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):13254
                                                                                                                                                                                                                                                Entropy (8bit):5.493142708176824
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:192:qnaRtLYbBp6Chj4qyaaXB6KjCNVF5RfGNBw8dBSl:vegqDYuXcwm0
                                                                                                                                                                                                                                                MD5:1406E8F5D9F8E5834DC1297682F00657
                                                                                                                                                                                                                                                SHA1:C7186206D57D05AAAC3F0731150D6E5CA2DB835A
                                                                                                                                                                                                                                                SHA-256:7D3CA4F8D7EB58CC7473AF53ECC4BEE6768CD7ADB5AC25FD33A0E1BE0C3517B2
                                                                                                                                                                                                                                                SHA-512:0E5ACE619EB37BAA81715FA52CF050C29224F8F71486D1EAFFEE4E5102F1037F0F6F0AD852DBF867FAFF9BA3BA984BAB913FBDB2E805D0714D6B8EBFA22EDF2B
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:// Mozilla User Preferences....// DO NOT EDIT THIS FILE...//..// If you make changes to this file while the application is running,..// the changes will be overwritten when the application exits...//..// To change a preference value, you can either:..// - modify it via the UI (e.g. via about:config in the browser); or..// - set it within a user.js file in your profile.....user_pref("app.normandy.first_run", false);..user_pref("app.normandy.migrationsApplied", 12);..user_pref("app.normandy.user_id", "57f16a19-e119-4073-bf01-28f88011f783");..user_pref("app.update.auto.migrated", true);..user_pref("app.update.background.rolledout", true);..user_pref("app.update.backgroundErrors", 2);..user_pref("app.update.lastUpdateTime.addon-background-update-timer", 1730107730);..user_pref("app.update.lastUpdateTime.background-update-timer", 1730107730);..user_pref("app.update.lastUpdateTime.browser-cleanup-thumbnails", 1730107730);..user_pref("app.update.lastUpdateTime.recipe-client-addon-run", 173010
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):65536
                                                                                                                                                                                                                                                Entropy (8bit):0.04062825861060003
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:6:ltBl/l4/WN1h4BEJYqWvLue3FMOrMZ0l:DBl/WuntfJiFxMZO
                                                                                                                                                                                                                                                MD5:18F65713B07CB441E6A98655B726D098
                                                                                                                                                                                                                                                SHA1:2CEFA32BC26B25BE81C411B60C9925CB0F1F8F88
                                                                                                                                                                                                                                                SHA-256:B6C268E48546B113551A5AF9CA86BB6A462A512DE6C9289315E125CEB0FD8621
                                                                                                                                                                                                                                                SHA-512:A6871076C7D7ED53B630F9F144ED04303AD54A2E60B94ECA2AA96964D1AB375EEFDCA86CE0D3EB0E9DBB81470C6BD159877125A080C95EB17E54A52427F805FB
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:SQLite format 3......@ ..........................................................................j.......x..x..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):493
                                                                                                                                                                                                                                                Entropy (8bit):4.976334288675204
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:12:YZFg11A/+VIVHlW8cOlZGV1AQIYzvZcyBuLZ2d:YoW/+VSlCOlZGV1AQIWZcy6Z2d
                                                                                                                                                                                                                                                MD5:0A202832B498208747A25C6FD9B74AA1
                                                                                                                                                                                                                                                SHA1:97324C0665EA8ACF0D0994EE9FBD1FAA38119274
                                                                                                                                                                                                                                                SHA-256:DBF7E0CC82A51B23E3F5BE928DD94D06A53012EA1A835DB4C7C2A4E58426B57A
                                                                                                                                                                                                                                                SHA-512:06A9935DFD6996E249137CE0E18FD0B2F475C6E4541BDF55CF453E9092D9A5481DB365E414F72C796923745070DE02BA5C485C332BF6FA16EB62289880C2C7E5
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:{"type":"health","id":"f86596a7-7ed7-4758-b8c4-9b7d1a6b9710","creationDate":"2024-10-28T09:29:20.258Z","version":4,"application":{"architecture":"x86-64","buildId":"20230927232528","name":"Firefox","version":"118.0.1","displayVersion":"118.0.1","vendor":"Mozilla","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","channel":"release"},"payload":{"os":{"name":"WINNT","version":"10.0"},"reason":"immediate","sendFailure":{"eUnreachable":1}},"clientId":"65e71c9e-6ac3-4903-9066-b134350de32c"}
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):493
                                                                                                                                                                                                                                                Entropy (8bit):4.976334288675204
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:12:YZFg11A/+VIVHlW8cOlZGV1AQIYzvZcyBuLZ2d:YoW/+VSlCOlZGV1AQIWZcy6Z2d
                                                                                                                                                                                                                                                MD5:0A202832B498208747A25C6FD9B74AA1
                                                                                                                                                                                                                                                SHA1:97324C0665EA8ACF0D0994EE9FBD1FAA38119274
                                                                                                                                                                                                                                                SHA-256:DBF7E0CC82A51B23E3F5BE928DD94D06A53012EA1A835DB4C7C2A4E58426B57A
                                                                                                                                                                                                                                                SHA-512:06A9935DFD6996E249137CE0E18FD0B2F475C6E4541BDF55CF453E9092D9A5481DB365E414F72C796923745070DE02BA5C485C332BF6FA16EB62289880C2C7E5
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:{"type":"health","id":"f86596a7-7ed7-4758-b8c4-9b7d1a6b9710","creationDate":"2024-10-28T09:29:20.258Z","version":4,"application":{"architecture":"x86-64","buildId":"20230927232528","name":"Firefox","version":"118.0.1","displayVersion":"118.0.1","vendor":"Mozilla","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","channel":"release"},"payload":{"os":{"name":"WINNT","version":"10.0"},"reason":"immediate","sendFailure":{"eUnreachable":1}},"clientId":"65e71c9e-6ac3-4903-9066-b134350de32c"}
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):90
                                                                                                                                                                                                                                                Entropy (8bit):4.194538242412464
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:3:YVXKQJAyiVLQwJtJDBA+AJ2LKZXJ3YFwHY:Y9KQOy6Lb1BA+m2L69Yr
                                                                                                                                                                                                                                                MD5:C4AB2EE59CA41B6D6A6EA911F35BDC00
                                                                                                                                                                                                                                                SHA1:5942CD6505FC8A9DABA403B082067E1CDEFDFBC4
                                                                                                                                                                                                                                                SHA-256:00AD9799527C3FD21F3A85012565EAE817490F3E0D417413BF9567BB5909F6A2
                                                                                                                                                                                                                                                SHA-512:71EA16900479E6AF161E0AAD08C8D1E9DED5868A8D848E7647272F3002E2F2013E16382B677ABE3C6F17792A26293B9E27EC78E16F00BD24BA3D21072BD1CAE2
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:{"profile-after-change":true,"final-ui-startup":true,"sessionstore-windows-restored":true}
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):90
                                                                                                                                                                                                                                                Entropy (8bit):4.194538242412464
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:3:YVXKQJAyiVLQwJtJDBA+AJ2LKZXJ3YFwHY:Y9KQOy6Lb1BA+m2L69Yr
                                                                                                                                                                                                                                                MD5:C4AB2EE59CA41B6D6A6EA911F35BDC00
                                                                                                                                                                                                                                                SHA1:5942CD6505FC8A9DABA403B082067E1CDEFDFBC4
                                                                                                                                                                                                                                                SHA-256:00AD9799527C3FD21F3A85012565EAE817490F3E0D417413BF9567BB5909F6A2
                                                                                                                                                                                                                                                SHA-512:71EA16900479E6AF161E0AAD08C8D1E9DED5868A8D848E7647272F3002E2F2013E16382B677ABE3C6F17792A26293B9E27EC78E16F00BD24BA3D21072BD1CAE2
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:{"profile-after-change":true,"final-ui-startup":true,"sessionstore-windows-restored":true}
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:Mozilla lz4 compressed data, originally 5861 bytes
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):1570
                                                                                                                                                                                                                                                Entropy (8bit):6.334991768224278
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:24:v+USUGlcAxSzLXnIgHf/pnxQwRlszT5sKt83eHVQj6THramhujJ5tHOsIomNVr0l:GUpOxOvZnR6C3eHTHr4JDIquR4
                                                                                                                                                                                                                                                MD5:B4EDB18284DA5F5DBA2F8F7742641BC4
                                                                                                                                                                                                                                                SHA1:C35B1D6AE243324F2BCF9C1A9FF8CD2077758310
                                                                                                                                                                                                                                                SHA-256:5996BCFDF44C56E732D505454CF0CBD0181F679F9D29AD359D6FD8712E50DF37
                                                                                                                                                                                                                                                SHA-512:7923BCC8F37BD549A9D83A597C11535770EAF3E486CF1A4D97A9F8960B892962C59747C8FFC4274CC9FB7ED7833059E46F16564501D42757657FF2FAB2B13F52
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":6,"docshellUU...D"{c24c4c45-08a7-4bc4-83e3-5029c4882d8d}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":7,"persistK..+}],"lastAccessed":1730107735231,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2167541758....dth":1164,"height":891,"screenX":4...Y..Aizem..."maximize......BeforeMin...&..workspace9...1a5ccf63-1000-409f-b5c1-afec7f75d4d9","zD..1...Wm..l........j..:....1":{..mUpdate...startTim..`699453...centCrash..B0},".....Dcook.. hoc..."addons.mozilla.org","valu...A8bad2467092e6ddeb0dfa9e5ea54d86d26790ca7ba2ce88d10cb4604fe726755","path":"/","na..a"taarI|.Recure...,`.Donly..fexpiry...06643,"originA...."
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:Mozilla lz4 compressed data, originally 5861 bytes
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):1570
                                                                                                                                                                                                                                                Entropy (8bit):6.334991768224278
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:24:v+USUGlcAxSzLXnIgHf/pnxQwRlszT5sKt83eHVQj6THramhujJ5tHOsIomNVr0l:GUpOxOvZnR6C3eHTHr4JDIquR4
                                                                                                                                                                                                                                                MD5:B4EDB18284DA5F5DBA2F8F7742641BC4
                                                                                                                                                                                                                                                SHA1:C35B1D6AE243324F2BCF9C1A9FF8CD2077758310
                                                                                                                                                                                                                                                SHA-256:5996BCFDF44C56E732D505454CF0CBD0181F679F9D29AD359D6FD8712E50DF37
                                                                                                                                                                                                                                                SHA-512:7923BCC8F37BD549A9D83A597C11535770EAF3E486CF1A4D97A9F8960B892962C59747C8FFC4274CC9FB7ED7833059E46F16564501D42757657FF2FAB2B13F52
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":6,"docshellUU...D"{c24c4c45-08a7-4bc4-83e3-5029c4882d8d}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":7,"persistK..+}],"lastAccessed":1730107735231,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2167541758....dth":1164,"height":891,"screenX":4...Y..Aizem..."maximize......BeforeMin...&..workspace9...1a5ccf63-1000-409f-b5c1-afec7f75d4d9","zD..1...Wm..l........j..:....1":{..mUpdate...startTim..`699453...centCrash..B0},".....Dcook.. hoc..."addons.mozilla.org","valu...A8bad2467092e6ddeb0dfa9e5ea54d86d26790ca7ba2ce88d10cb4604fe726755","path":"/","na..a"taarI|.Recure...,`.Donly..fexpiry...06643,"originA...."
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:Mozilla lz4 compressed data, originally 5861 bytes
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):1570
                                                                                                                                                                                                                                                Entropy (8bit):6.334991768224278
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:24:v+USUGlcAxSzLXnIgHf/pnxQwRlszT5sKt83eHVQj6THramhujJ5tHOsIomNVr0l:GUpOxOvZnR6C3eHTHr4JDIquR4
                                                                                                                                                                                                                                                MD5:B4EDB18284DA5F5DBA2F8F7742641BC4
                                                                                                                                                                                                                                                SHA1:C35B1D6AE243324F2BCF9C1A9FF8CD2077758310
                                                                                                                                                                                                                                                SHA-256:5996BCFDF44C56E732D505454CF0CBD0181F679F9D29AD359D6FD8712E50DF37
                                                                                                                                                                                                                                                SHA-512:7923BCC8F37BD549A9D83A597C11535770EAF3E486CF1A4D97A9F8960B892962C59747C8FFC4274CC9FB7ED7833059E46F16564501D42757657FF2FAB2B13F52
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":6,"docshellUU...D"{c24c4c45-08a7-4bc4-83e3-5029c4882d8d}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":7,"persistK..+}],"lastAccessed":1730107735231,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2167541758....dth":1164,"height":891,"screenX":4...Y..Aizem..."maximize......BeforeMin...&..workspace9...1a5ccf63-1000-409f-b5c1-afec7f75d4d9","zD..1...Wm..l........j..:....1":{..mUpdate...startTim..`699453...centCrash..B0},".....Dcook.. hoc..."addons.mozilla.org","valu...A8bad2467092e6ddeb0dfa9e5ea54d86d26790ca7ba2ce88d10cb4604fe726755","path":"/","na..a"taarI|.Recure...,`.Donly..fexpiry...06643,"originA...."
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):4096
                                                                                                                                                                                                                                                Entropy (8bit):2.0836444556178684
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:24:JBwdh/cEUcR9PzNFPFHx/GJRBdkOrDcRB1trwDeAq2gRMyxr3:jnEUo9LXtR+JdkOnohYsl
                                                                                                                                                                                                                                                MD5:8B40B1534FF0F4B533AF767EB5639A05
                                                                                                                                                                                                                                                SHA1:63EDB539EA39AD09D701A36B535C4C087AE08CC9
                                                                                                                                                                                                                                                SHA-256:AF275A19A5C2C682139266065D90C237282274D11C5619A121B7BDBDB252861B
                                                                                                                                                                                                                                                SHA-512:54AF707698CED33C206B1B193DA414D630901762E88E37E99885A50D4D5F8DDC28367C9B401DFE251CF0552B4FA446EE28F78A97C9096AFB0F2898BFBB673B53
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):4537
                                                                                                                                                                                                                                                Entropy (8bit):5.034018574563735
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:48:YrSAYh6UQZpExB1+anOsW4Vh351VxWRzzc8eYMsku7f86SLAVL7if5FtsfAcbyJW:ychyTEr5QFRzzcMvbw6KkCrrc2Rn27
                                                                                                                                                                                                                                                MD5:842368C61D61EE08779F58F75654B388
                                                                                                                                                                                                                                                SHA1:0545886C72F2C43E6460DA1267AF20F814B95C0F
                                                                                                                                                                                                                                                SHA-256:5A1BA8A25C1A9D18A1835D6900B81DE25EBCF5F1064228715B0C0AE1396244A9
                                                                                                                                                                                                                                                SHA-512:C69A8C83068F53238BB0535FB9222F550F2FC7E0884980006D456EED0AA6CB205C68D2F537A933E9B5F9E341069E29BB042D401E36529324110878492C82442F
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:{"environment":{"locale":"en-US","localeLanguageCode":"en","browserSettings":{"update":{"channel":"release","enabled":true,"autoDownload":true,"background":true}},"attributionData":{"campaign":"%2528not%2Bset%2529","content":"%2528not%2Bset%2529","dlsource":"mozorg","dltoken":"cd09ae95-e2cf-4b8b-8929-791b0dd48cdd","experiment":"%2528not%2Bset%2529","medium":"referral","source":"www.google.com","ua":"chrome","variation":"%2528not%2Bset%2529"},"currentDate":"2024-10-28T09:28:36.926Z","profileAgeCreated":1696333826043,"usesFirefoxSync":false,"isFxAEnabled":true,"isFxASignedIn":false,"sync":{"desktopDevices":0,"mobileDevices":0,"totalDevices":0},"xpinstallEnabled":true,"addonsInfo":{"addons":{"formautofill@mozilla.org":{"version":"1.0.1","type":"extension","isSystem":true,"isWebExtension":true,"name":"Form Autofill","userDisabled":false,"installDate":"2023-09-28T01:41:23.000Z"},"pictureinpicture@mozilla.org":{"version":"1.0.0","type":"extension","isSystem":true,"isWebExtension":true,"name"
                                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                                Size (bytes):4537
                                                                                                                                                                                                                                                Entropy (8bit):5.034018574563735
                                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                                SSDEEP:48:YrSAYh6UQZpExB1+anOsW4Vh351VxWRzzc8eYMsku7f86SLAVL7if5FtsfAcbyJW:ychyTEr5QFRzzcMvbw6KkCrrc2Rn27
                                                                                                                                                                                                                                                MD5:842368C61D61EE08779F58F75654B388
                                                                                                                                                                                                                                                SHA1:0545886C72F2C43E6460DA1267AF20F814B95C0F
                                                                                                                                                                                                                                                SHA-256:5A1BA8A25C1A9D18A1835D6900B81DE25EBCF5F1064228715B0C0AE1396244A9
                                                                                                                                                                                                                                                SHA-512:C69A8C83068F53238BB0535FB9222F550F2FC7E0884980006D456EED0AA6CB205C68D2F537A933E9B5F9E341069E29BB042D401E36529324110878492C82442F
                                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                                Preview:{"environment":{"locale":"en-US","localeLanguageCode":"en","browserSettings":{"update":{"channel":"release","enabled":true,"autoDownload":true,"background":true}},"attributionData":{"campaign":"%2528not%2Bset%2529","content":"%2528not%2Bset%2529","dlsource":"mozorg","dltoken":"cd09ae95-e2cf-4b8b-8929-791b0dd48cdd","experiment":"%2528not%2Bset%2529","medium":"referral","source":"www.google.com","ua":"chrome","variation":"%2528not%2Bset%2529"},"currentDate":"2024-10-28T09:28:36.926Z","profileAgeCreated":1696333826043,"usesFirefoxSync":false,"isFxAEnabled":true,"isFxASignedIn":false,"sync":{"desktopDevices":0,"mobileDevices":0,"totalDevices":0},"xpinstallEnabled":true,"addonsInfo":{"addons":{"formautofill@mozilla.org":{"version":"1.0.1","type":"extension","isSystem":true,"isWebExtension":true,"name":"Form Autofill","userDisabled":false,"installDate":"2023-09-28T01:41:23.000Z"},"pictureinpicture@mozilla.org":{"version":"1.0.0","type":"extension","isSystem":true,"isWebExtension":true,"name"
                                                                                                                                                                                                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                                                Entropy (8bit):6.584671415312418
                                                                                                                                                                                                                                                TrID:
                                                                                                                                                                                                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                                                                                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                                                                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                                                                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                                                                                                                File name:file.exe
                                                                                                                                                                                                                                                File size:919'552 bytes
                                                                                                                                                                                                                                                MD5:f7be8753894e3b1f1829c067805e430a
                                                                                                                                                                                                                                                SHA1:ca077aac7ec9b14cea8970bacd13678a3b1eeb2f
                                                                                                                                                                                                                                                SHA256:02ef83bdd19b7b7b00226d160f5907c48d36d1ba923c2a1694ac93ca7a34d4cd
                                                                                                                                                                                                                                                SHA512:61a93cf1494a95b1eb7c0b8565a7ed2edee0e644330b977bab09e76aa9fdfc03ede907ae965df9f122cb188457ebe4f526b84091bc1ae8f737eda894e916cbe4
                                                                                                                                                                                                                                                SSDEEP:12288:kqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDga/TT:kqDEvCTbMWu7rQYlBQcBiT6rprG8abT
                                                                                                                                                                                                                                                TLSH:22159E0273D1C062FFAB92334B5AF6515BBC69260123E61F13981DB9BE701B1563E7A3
                                                                                                                                                                                                                                                File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                                                                                                                                                                                                                Icon Hash:aaf3e3e3938382a0
                                                                                                                                                                                                                                                Entrypoint:0x420577
                                                                                                                                                                                                                                                Entrypoint Section:.text
                                                                                                                                                                                                                                                Digitally signed:false
                                                                                                                                                                                                                                                Imagebase:0x400000
                                                                                                                                                                                                                                                Subsystem:windows gui
                                                                                                                                                                                                                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                                                                                                                                                                                DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                                                                                                                                                                                                Time Stamp:0x671F3C02 [Mon Oct 28 07:23:46 2024 UTC]
                                                                                                                                                                                                                                                TLS Callbacks:
                                                                                                                                                                                                                                                CLR (.Net) Version:
                                                                                                                                                                                                                                                OS Version Major:5
                                                                                                                                                                                                                                                OS Version Minor:1
                                                                                                                                                                                                                                                File Version Major:5
                                                                                                                                                                                                                                                File Version Minor:1
                                                                                                                                                                                                                                                Subsystem Version Major:5
                                                                                                                                                                                                                                                Subsystem Version Minor:1
                                                                                                                                                                                                                                                Import Hash:948cc502fe9226992dce9417f952fce3
                                                                                                                                                                                                                                                Instruction
                                                                                                                                                                                                                                                call 00007F14B9343BB3h
                                                                                                                                                                                                                                                jmp 00007F14B93434BFh
                                                                                                                                                                                                                                                push ebp
                                                                                                                                                                                                                                                mov ebp, esp
                                                                                                                                                                                                                                                push esi
                                                                                                                                                                                                                                                push dword ptr [ebp+08h]
                                                                                                                                                                                                                                                mov esi, ecx
                                                                                                                                                                                                                                                call 00007F14B934369Dh
                                                                                                                                                                                                                                                mov dword ptr [esi], 0049FDF0h
                                                                                                                                                                                                                                                mov eax, esi
                                                                                                                                                                                                                                                pop esi
                                                                                                                                                                                                                                                pop ebp
                                                                                                                                                                                                                                                retn 0004h
                                                                                                                                                                                                                                                and dword ptr [ecx+04h], 00000000h
                                                                                                                                                                                                                                                mov eax, ecx
                                                                                                                                                                                                                                                and dword ptr [ecx+08h], 00000000h
                                                                                                                                                                                                                                                mov dword ptr [ecx+04h], 0049FDF8h
                                                                                                                                                                                                                                                mov dword ptr [ecx], 0049FDF0h
                                                                                                                                                                                                                                                ret
                                                                                                                                                                                                                                                push ebp
                                                                                                                                                                                                                                                mov ebp, esp
                                                                                                                                                                                                                                                push esi
                                                                                                                                                                                                                                                push dword ptr [ebp+08h]
                                                                                                                                                                                                                                                mov esi, ecx
                                                                                                                                                                                                                                                call 00007F14B934366Ah
                                                                                                                                                                                                                                                mov dword ptr [esi], 0049FE0Ch
                                                                                                                                                                                                                                                mov eax, esi
                                                                                                                                                                                                                                                pop esi
                                                                                                                                                                                                                                                pop ebp
                                                                                                                                                                                                                                                retn 0004h
                                                                                                                                                                                                                                                and dword ptr [ecx+04h], 00000000h
                                                                                                                                                                                                                                                mov eax, ecx
                                                                                                                                                                                                                                                and dword ptr [ecx+08h], 00000000h
                                                                                                                                                                                                                                                mov dword ptr [ecx+04h], 0049FE14h
                                                                                                                                                                                                                                                mov dword ptr [ecx], 0049FE0Ch
                                                                                                                                                                                                                                                ret
                                                                                                                                                                                                                                                push ebp
                                                                                                                                                                                                                                                mov ebp, esp
                                                                                                                                                                                                                                                push esi
                                                                                                                                                                                                                                                mov esi, ecx
                                                                                                                                                                                                                                                lea eax, dword ptr [esi+04h]
                                                                                                                                                                                                                                                mov dword ptr [esi], 0049FDD0h
                                                                                                                                                                                                                                                and dword ptr [eax], 00000000h
                                                                                                                                                                                                                                                and dword ptr [eax+04h], 00000000h
                                                                                                                                                                                                                                                push eax
                                                                                                                                                                                                                                                mov eax, dword ptr [ebp+08h]
                                                                                                                                                                                                                                                add eax, 04h
                                                                                                                                                                                                                                                push eax
                                                                                                                                                                                                                                                call 00007F14B934625Dh
                                                                                                                                                                                                                                                pop ecx
                                                                                                                                                                                                                                                pop ecx
                                                                                                                                                                                                                                                mov eax, esi
                                                                                                                                                                                                                                                pop esi
                                                                                                                                                                                                                                                pop ebp
                                                                                                                                                                                                                                                retn 0004h
                                                                                                                                                                                                                                                lea eax, dword ptr [ecx+04h]
                                                                                                                                                                                                                                                mov dword ptr [ecx], 0049FDD0h
                                                                                                                                                                                                                                                push eax
                                                                                                                                                                                                                                                call 00007F14B93462A8h
                                                                                                                                                                                                                                                pop ecx
                                                                                                                                                                                                                                                ret
                                                                                                                                                                                                                                                push ebp
                                                                                                                                                                                                                                                mov ebp, esp
                                                                                                                                                                                                                                                push esi
                                                                                                                                                                                                                                                mov esi, ecx
                                                                                                                                                                                                                                                lea eax, dword ptr [esi+04h]
                                                                                                                                                                                                                                                mov dword ptr [esi], 0049FDD0h
                                                                                                                                                                                                                                                push eax
                                                                                                                                                                                                                                                call 00007F14B9346291h
                                                                                                                                                                                                                                                test byte ptr [ebp+08h], 00000001h
                                                                                                                                                                                                                                                pop ecx
                                                                                                                                                                                                                                                Programming Language:
                                                                                                                                                                                                                                                • [ C ] VS2008 SP1 build 30729
                                                                                                                                                                                                                                                • [IMP] VS2008 SP1 build 30729
                                                                                                                                                                                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x9c28.rsrc
                                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xde0000x7594.reloc
                                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                                                                                                .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                                                                .rsrc0xd40000x9c280x9e009fdd4016cb1c8af83781dab462a4f205False0.3156398338607595data5.373911608598158IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                .reloc0xde0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                                                                                                                RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                                                                                                                                                                                                RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                                                                                                                                                                                                RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                                                                                                                                                                                                RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                                                                                                                                                                                                RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                                                                                                                                                                                                RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                                                                                                                                                                                                RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                                                                                                                                                                                                RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                                                                                                                                                                                                RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                                                                                                                                                                                                RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                                                                                                                                                                                                RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                                                                                                                                                                                                RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                                                                                                                                                                                                                RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                                                                                                                                                                                                RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                                                                                                                                                                                                                RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                                                                                                                                                                                                                RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                                                                                                                                                                                                RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                                                                                                                                                                                                RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                                                                                                                                                                                                RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                                                                                                                                                                                                RT_RCDATA0xdc7b80xef0data1.0028765690376569
                                                                                                                                                                                                                                                RT_GROUP_ICON0xdd6a80x76dataEnglishGreat Britain0.6610169491525424
                                                                                                                                                                                                                                                RT_GROUP_ICON0xdd7200x14dataEnglishGreat Britain1.25
                                                                                                                                                                                                                                                RT_GROUP_ICON0xdd7340x14dataEnglishGreat Britain1.15
                                                                                                                                                                                                                                                RT_GROUP_ICON0xdd7480x14dataEnglishGreat Britain1.25
                                                                                                                                                                                                                                                RT_VERSION0xdd75c0xdcdataEnglishGreat Britain0.6181818181818182
                                                                                                                                                                                                                                                RT_MANIFEST0xdd8380x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                                                                                                                                                                                                DLLImport
                                                                                                                                                                                                                                                WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                                                                                                                                                                                                                VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                                                                                                                                                                                                                WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                                                                                                                                                                                                COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                                                                                                                                                                                                MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                                                                                                                                                                                                                WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                                                                                                                                                                                                                PSAPI.DLLGetProcessMemoryInfo
                                                                                                                                                                                                                                                IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                                                                                                                                                                                                                USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                                                                                                                                                                                                                UxTheme.dllIsThemeActive
                                                                                                                                                                                                                                                KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                                                                                                                                                                                                                USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                                                                                                                                                                                                                GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                                                                                                                                                                                                                COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                                                                                                                                                                                                ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                                                                                                                                                                                                                SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                                                                                                                                                                                                                ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                                                                                                                                                                                                                OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                                                                                                                                                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                                                                                                                                                                                EnglishGreat Britain
                                                                                                                                                                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:02.681963921 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:02.681996107 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:02.683572054 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:02.687792063 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:02.687809944 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:03.312073946 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:03.312145948 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:03.319879055 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:03.319889069 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:03.320007086 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:03.320194006 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:03.324486017 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:04.773634911 CET49738443192.168.2.4142.250.185.206
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:04.773680925 CET44349738142.250.185.206192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:04.774224997 CET49738443192.168.2.4142.250.185.206
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:04.775763035 CET49738443192.168.2.4142.250.185.206
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:04.775785923 CET44349738142.250.185.206192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.011364937 CET49739443192.168.2.4142.250.185.206
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.011404037 CET44349739142.250.185.206192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.013015985 CET4974080192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.015980005 CET49739443192.168.2.4142.250.185.206
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.018060923 CET49739443192.168.2.4142.250.185.206
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.018075943 CET44349739142.250.185.206192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.018647909 CET804974034.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.022540092 CET4974080192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.022821903 CET4974080192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.028157949 CET804974034.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.409162998 CET49741443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.409209967 CET4434974134.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.409575939 CET49741443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.410965919 CET49741443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.410979033 CET4434974134.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.416456938 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.416496992 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.416587114 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.418776035 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.418792009 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.587579966 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.587634087 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.594795942 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.594963074 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.594974995 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.626394987 CET804974034.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.655518055 CET44349738142.250.185.206192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.656552076 CET44349738142.250.185.206192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.662442923 CET49738443192.168.2.4142.250.185.206
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.662475109 CET44349738142.250.185.206192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.669193029 CET49738443192.168.2.4142.250.185.206
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.669217110 CET44349738142.250.185.206192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.669312954 CET49738443192.168.2.4142.250.185.206
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.669517994 CET44349738142.250.185.206192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.669579983 CET49738443192.168.2.4142.250.185.206
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.671132088 CET4974080192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.750518084 CET49744443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.750566006 CET4434974434.160.144.191192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.750828028 CET49744443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.751095057 CET49744443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.751116991 CET4434974434.160.144.191192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.864882946 CET4974580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.870377064 CET804974534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.871689081 CET4974580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.871967077 CET4974580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.877197981 CET44349739142.250.185.206192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.877275944 CET804974534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.878456116 CET49739443192.168.2.4142.250.185.206
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.878634930 CET44349739142.250.185.206192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.879868031 CET49739443192.168.2.4142.250.185.206
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.884887934 CET49739443192.168.2.4142.250.185.206
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.884912968 CET44349739142.250.185.206192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.885023117 CET49739443192.168.2.4142.250.185.206
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.885227919 CET44349739142.250.185.206192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.885468006 CET49746443192.168.2.4142.250.185.206
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.885514021 CET44349746142.250.185.206192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.887382030 CET49739443192.168.2.4142.250.185.206
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.887422085 CET49746443192.168.2.4142.250.185.206
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.889374018 CET49746443192.168.2.4142.250.185.206
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.889401913 CET44349746142.250.185.206192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.024293900 CET4434974134.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.025379896 CET49741443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.032157898 CET49741443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.032193899 CET4434974134.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.032318115 CET49741443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.032496929 CET4434974134.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.032778025 CET49747443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.032824039 CET4434974734.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.032984972 CET49741443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.033014059 CET49747443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.035083055 CET49747443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.035104990 CET4434974734.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.062165976 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.062406063 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.068074942 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.068089008 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.068213940 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.068330050 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.068682909 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.068742990 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.072344065 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.072396040 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.074353933 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.074385881 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.218971014 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.218992949 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.219521046 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.223865032 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.223881006 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.224406004 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.227008104 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.227111101 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.227251053 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.235145092 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.235165119 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.311570883 CET4974080192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.317497969 CET804974034.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.318806887 CET4974080192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.365700006 CET4434974434.160.144.191192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.365813017 CET49744443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.370356083 CET49744443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.370383024 CET4434974434.160.144.191192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.370763063 CET4434974434.160.144.191192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.373332024 CET49744443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.373462915 CET49744443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.373641014 CET4434974434.160.144.191192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.373898983 CET49750443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.373928070 CET4434975034.160.144.191192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.381310940 CET49744443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.381310940 CET49744443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.381450891 CET49750443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.381581068 CET49750443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.381596088 CET4434975034.160.144.191192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.468910933 CET804974534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.469197035 CET4974580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.475018978 CET804974534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.475220919 CET4974580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.519262075 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.524555922 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.524807930 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.525012970 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.530284882 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.648734093 CET4434974734.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.655349016 CET4434974734.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.666624069 CET49747443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.672408104 CET49747443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.672430038 CET4434974734.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.672516108 CET49747443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.672888994 CET4434974734.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.682231903 CET49747443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.683320045 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.683361053 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.699001074 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.699042082 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.719866991 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.736627102 CET44349746142.250.185.206192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.737229109 CET44349746142.250.185.206192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.739778996 CET49746443192.168.2.4142.250.185.206
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.739806890 CET44349746142.250.185.206192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.739836931 CET49746443192.168.2.4142.250.185.206
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.765888929 CET49746443192.168.2.4142.250.185.206
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.765924931 CET44349746142.250.185.206192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.766005039 CET49746443192.168.2.4142.250.185.206
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.766189098 CET44349746142.250.185.206192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.766745090 CET49746443192.168.2.4142.250.185.206
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.996799946 CET4434975034.160.144.191192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.996815920 CET4434975034.160.144.191192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.997787952 CET49750443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.023304939 CET49750443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.023329020 CET4434975034.160.144.191192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.023646116 CET4434975034.160.144.191192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.083692074 CET49750443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.095016956 CET49750443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.095127106 CET49750443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.095335007 CET4434975034.160.144.191192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.103753090 CET49750443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.119738102 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.164201975 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.862895966 CET4975380192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.868273020 CET804975334.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.868671894 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.870050907 CET4975380192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.870238066 CET4975380192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.871812105 CET4975480192.168.2.4142.250.186.99
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.874020100 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.875613928 CET804975334.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.877199888 CET8049754142.250.186.99192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.879160881 CET4975480192.168.2.4142.250.186.99
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.879364014 CET4975480192.168.2.4142.250.186.99
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.884610891 CET8049754142.250.186.99192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.993057013 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.055350065 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.064085960 CET4975380192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.088146925 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.093576908 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.102293968 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.102576971 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.107902050 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.112135887 CET804975334.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.353662968 CET804975334.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.353852987 CET4975380192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.493535042 CET49757443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.493561983 CET4434975734.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.494544029 CET49757443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.498502016 CET49757443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.498539925 CET4434975734.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.595432043 CET49758443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.595448971 CET4434975834.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.595633030 CET49758443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.596947908 CET49758443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.596957922 CET4434975834.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.606319904 CET49759443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.606353998 CET4434975934.149.100.209192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.606580019 CET49759443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.607958078 CET49759443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.607974052 CET4434975934.149.100.209192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.691250086 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.723467112 CET49760443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.723541975 CET4434976035.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.726144075 CET49760443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.747132063 CET49760443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.747167110 CET4434976035.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.749701977 CET8049754142.250.186.99192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.757354975 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.804223061 CET4975480192.168.2.4142.250.186.99
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.813851118 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.813874006 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.936829090 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.982217073 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.093152046 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.093163013 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.093183041 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.093183041 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.093193054 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.093203068 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.094769955 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.094775915 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.117640018 CET4434975734.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.117768049 CET49757443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.216423988 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.220973969 CET4434975834.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.221081018 CET49758443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.231695890 CET49758443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.231724024 CET4434975834.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.231780052 CET49758443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.231954098 CET4434975834.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.232927084 CET49758443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.234703064 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.241159916 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.246203899 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.246229887 CET4434976234.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.246335030 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.247710943 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.247724056 CET4434976234.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.253001928 CET4434975934.149.100.209192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.257268906 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.257270098 CET49759443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.264501095 CET49759443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.264522076 CET4434975934.149.100.209192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.264590025 CET49759443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.264801025 CET4434975934.149.100.209192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.265357971 CET49759443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.295836926 CET49763443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.295861959 CET4434976334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.299297094 CET49764443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.299361944 CET4434976434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.310676098 CET49763443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.310910940 CET49764443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.312226057 CET49763443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.312243938 CET4434976334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.312333107 CET49764443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.312350988 CET4434976434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.338653088 CET4434976334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.338715076 CET4434976434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.339662075 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.345899105 CET4434976035.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.355330944 CET4434976035.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.357470989 CET49760443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.360517979 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.390543938 CET49760443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.390598059 CET4434976035.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.390867949 CET4434976035.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.394479990 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.394521952 CET4434976534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.394526005 CET49766443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.394557953 CET4434976634.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.395256996 CET49766443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.395260096 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.395282984 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.395293951 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.396600962 CET49766443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.396620035 CET4434976634.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.396661997 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.396687031 CET4434976534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.402612925 CET49760443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.402672052 CET49760443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.402745008 CET4434976035.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.407495975 CET49760443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.407711029 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.407722950 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.407802105 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.407802105 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.407808065 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.407948971 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.410861969 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.410875082 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.417622089 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.423013926 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.465112925 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.470570087 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.541032076 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.589767933 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.595113993 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.655618906 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.872929096 CET4434976234.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.873040915 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.893464088 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.893481970 CET4434976234.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.893554926 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.893984079 CET4434976234.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.894099951 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.998187065 CET4434976634.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.998264074 CET49766443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.001303911 CET49766443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.001316071 CET4434976634.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.001652956 CET4434976634.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.002712965 CET4434976534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.002839088 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.005156994 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.005167961 CET4434976534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.005511999 CET4434976534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.006473064 CET49766443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.006562948 CET49766443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.006650925 CET4434976634.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.007138968 CET49766443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.007936954 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.007998943 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.008117914 CET4434976534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.008192062 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:11.776319981 CET49757443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:11.776355982 CET4434975734.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:11.902384996 CET4434975734.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:11.943484068 CET49757443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:12.834023952 CET49757443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:12.834064007 CET4434975734.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:12.834130049 CET49757443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:12.834136009 CET4434975734.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:12.834754944 CET49768443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:12.834805012 CET4434976834.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:12.835146904 CET49768443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:12.836798906 CET49768443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:12.836818933 CET4434976834.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:12.882314920 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:12.887742043 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:12.944601059 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:12.945668936 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:12.945712090 CET4434976934.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:12.946398020 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:12.948111057 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:12.948148966 CET4434976934.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:12.950124025 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:12.959299088 CET4434975734.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:13.006701946 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:13.008857012 CET49757443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:13.046638012 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:13.093656063 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:13.146912098 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:13.460448980 CET4434976834.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:13.461680889 CET49768443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:13.469289064 CET49768443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:13.469311953 CET4434976834.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:13.469376087 CET49768443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:13.469465017 CET4434976834.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:13.477838993 CET49768443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:13.577956915 CET4434976934.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:13.578238964 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:13.581752062 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:13.581752062 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:13.581783056 CET4434976934.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:13.582211018 CET4434976934.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:13.583381891 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.667032003 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.672513008 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.790985107 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.843827963 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.895710945 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.901204109 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:18.020723104 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:18.066644907 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:18.696161985 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:18.768580914 CET4975480192.168.2.4142.250.186.99
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:18.811918974 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:18.811932087 CET8049754142.250.186.99192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:18.929003000 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:18.969132900 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:23.980794907 CET49775443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:23.980885029 CET4434977534.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:23.983793974 CET49775443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:23.985743999 CET49775443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:23.985817909 CET4434977534.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:24.604659081 CET4434977534.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:24.607358932 CET49775443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:24.613456964 CET49775443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:24.613456964 CET49775443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:24.613517046 CET4434977534.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:24.613893986 CET4434977534.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:24.615742922 CET49775443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:24.618608952 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:24.624260902 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:24.743812084 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:24.748441935 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:24.754076004 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:24.785979033 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:24.872643948 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:24.917654991 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:28.818222046 CET4975480192.168.2.4142.250.186.99
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:28.823715925 CET8049754142.250.186.99192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.448415041 CET49776443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.448472023 CET4434977635.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.453454971 CET49776443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.453597069 CET49776443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.453608990 CET4434977635.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.494426012 CET49777443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.494482994 CET4434977734.149.100.209192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.494673967 CET49778443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.494685888 CET4434977835.190.72.216192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.497701883 CET49777443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.497859001 CET49778443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.498027086 CET49777443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.498049021 CET4434977734.149.100.209192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.499542952 CET49778443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.499564886 CET4434977835.190.72.216192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.500111103 CET49779443192.168.2.4151.101.65.91
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.500148058 CET44349779151.101.65.91192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.500797987 CET49779443192.168.2.4151.101.65.91
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.500931978 CET49779443192.168.2.4151.101.65.91
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.500943899 CET44349779151.101.65.91192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.514389992 CET49780443192.168.2.435.201.103.21
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.514421940 CET4434978035.201.103.21192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.523627043 CET49780443192.168.2.435.201.103.21
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.540710926 CET49780443192.168.2.435.201.103.21
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.540740013 CET4434978035.201.103.21192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.062896013 CET4434977635.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.062990904 CET49776443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.066626072 CET49776443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.066648960 CET4434977635.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.067087889 CET4434977635.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.069735050 CET49776443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.069849968 CET49776443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.069947958 CET4434977635.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.070485115 CET49776443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.074088097 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.079624891 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.101433039 CET4434977734.149.100.209192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.101516962 CET49777443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.104784966 CET49777443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.104799986 CET4434977734.149.100.209192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.105120897 CET4434977734.149.100.209192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.107892990 CET49777443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.107994080 CET49777443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.108078003 CET4434977734.149.100.209192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.109334946 CET49777443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.118048906 CET4434977835.190.72.216192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.118140936 CET49778443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.119798899 CET44349779151.101.65.91192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.119950056 CET49779443192.168.2.4151.101.65.91
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.123383999 CET49779443192.168.2.4151.101.65.91
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.123404980 CET44349779151.101.65.91192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.123796940 CET44349779151.101.65.91192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.126828909 CET49778443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.126836061 CET4434977835.190.72.216192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.126926899 CET49778443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.127159119 CET4434977835.190.72.216192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.127249002 CET49779443192.168.2.4151.101.65.91
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.127293110 CET49779443192.168.2.4151.101.65.91
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.127456903 CET44349779151.101.65.91192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.127522945 CET49778443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.127526999 CET49779443192.168.2.4151.101.65.91
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.136094093 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.136145115 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.136238098 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.136353970 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.136364937 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.138518095 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.138618946 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.138884068 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.138989925 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.139041901 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.141161919 CET49783443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.141179085 CET4434978335.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.141321898 CET49783443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.141419888 CET49783443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.141431093 CET4434978335.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.155883074 CET4434978035.201.103.21192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.155905008 CET4434978035.201.103.21192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.155967951 CET49780443192.168.2.435.201.103.21
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.161487103 CET49780443192.168.2.435.201.103.21
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.161503077 CET4434978035.201.103.21192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.161595106 CET49780443192.168.2.435.201.103.21
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.161792994 CET4434978035.201.103.21192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.161914110 CET49780443192.168.2.435.201.103.21
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.183794975 CET49784443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.183836937 CET4434978434.149.100.209192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.183939934 CET49784443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.184067965 CET49784443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.184077024 CET4434978434.149.100.209192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.198983908 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.201951981 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.207464933 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.241493940 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.325901031 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.379630089 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.741661072 CET4434978335.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.741844893 CET49783443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.745698929 CET49783443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.745714903 CET4434978335.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.746053934 CET4434978335.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.746767044 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.746836901 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.747080088 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.747147083 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.750077009 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.750083923 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.750392914 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.753304958 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.753326893 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.753639936 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.756170034 CET49783443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.756350040 CET4434978335.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.756661892 CET49783443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.756673098 CET4434978335.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.757735968 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.757812977 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.757900953 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.758574963 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.759192944 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.759287119 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.759371996 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.760169983 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.762227058 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.767517090 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.806392908 CET4434978434.149.100.209192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.806588888 CET49784443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.809952021 CET49784443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.809966087 CET4434978434.149.100.209192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.810275078 CET4434978434.149.100.209192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.812405109 CET49784443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.812505007 CET49784443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.812581062 CET4434978434.149.100.209192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.812679052 CET49784443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.887126923 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.892882109 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.901314974 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.943509102 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.963336945 CET4434978335.244.181.201192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.963399887 CET49783443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:33.016658068 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:33.059447050 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:34.662971973 CET49786443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:34.663001060 CET4434978634.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:34.663145065 CET49786443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:34.665246964 CET49786443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:34.665261984 CET4434978634.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:35.287836075 CET4434978634.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:35.287992954 CET49786443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:35.293761015 CET49786443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:35.293773890 CET4434978634.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:35.293876886 CET49786443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:35.294104099 CET4434978634.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:35.294893026 CET49786443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:35.297277927 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:35.302726984 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:35.421905041 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:35.427294016 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:35.432734966 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:35.466779947 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:35.550726891 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:35.604827881 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:38.830009937 CET4975480192.168.2.4142.250.186.99
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:38.835521936 CET8049754142.250.186.99192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:41.192073107 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:41.200010061 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:41.320166111 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:41.323062897 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:41.328481913 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:41.368818998 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:41.446913958 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:41.506819963 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:48.857640028 CET4975480192.168.2.4142.250.186.99
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:48.863120079 CET8049754142.250.186.99192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:51.335963011 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:51.341577053 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:51.451844931 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:51.457362890 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:55.943802118 CET49795443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:55.943859100 CET4434979534.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:55.944135904 CET49795443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:55.945590973 CET49795443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:55.945607901 CET4434979534.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:56.572690964 CET4434979534.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:56.572788954 CET49795443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:56.576809883 CET49795443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:56.576831102 CET4434979534.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:56.576894045 CET49795443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:56.577131987 CET4434979534.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:56.577719927 CET49795443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:56.579926014 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:56.585331917 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:56.704933882 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:56.708050013 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:56.713464975 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:56.763042927 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:56.832784891 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:56.878904104 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:58.869137049 CET4975480192.168.2.4142.250.186.99
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:58.874470949 CET8049754142.250.186.99192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.337677956 CET49826443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.337723017 CET4434982634.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.337977886 CET49827443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.338047981 CET4434982734.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.338458061 CET49826443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.338500977 CET49827443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.338629007 CET49826443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.338639021 CET4434982634.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.338802099 CET49827443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.338825941 CET4434982734.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.347610950 CET49828443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.347651005 CET4434982834.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.349669933 CET49828443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.349889994 CET49828443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.349904060 CET4434982834.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.947945118 CET4434982634.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.947995901 CET4434982734.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.956916094 CET49826443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.956914902 CET49827443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.961119890 CET49826443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.961139917 CET4434982634.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.961431980 CET4434982634.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.964442015 CET49827443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.964472055 CET4434982734.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.964735985 CET4434982734.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.966272116 CET4434982834.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.969033957 CET49826443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.969202042 CET4434982634.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.969336033 CET49826443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.969347000 CET4434982634.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.969639063 CET49827443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.969727993 CET49827443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.969793081 CET4434982734.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.970870018 CET49826443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.970906019 CET49827443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.970923901 CET49826443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.970937014 CET49826443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.971903086 CET49828443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.974915028 CET49828443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.974941969 CET4434982834.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.975809097 CET4434982834.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.978187084 CET49828443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.978267908 CET49828443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.978559971 CET4434982834.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.978971004 CET49827443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.978991032 CET49828443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.979010105 CET49828443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.050990105 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.053505898 CET49834443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.053545952 CET4434983434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.056476116 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.057168007 CET49834443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.057324886 CET49834443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.057332039 CET4434983434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.063407898 CET49835443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.063503027 CET4434983534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.063807011 CET49836443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.063846111 CET4434983634.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.063882113 CET49835443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.064002991 CET49835443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.064028978 CET4434983534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.064105988 CET49836443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.064223051 CET49836443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.064230919 CET4434983634.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.083904028 CET49837443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.083941936 CET4434983734.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.088288069 CET49837443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.088501930 CET49837443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.088515043 CET4434983734.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.175856113 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.208678961 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.214189053 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.232578039 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.363234043 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.415700912 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.738101006 CET4434983534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.738465071 CET4434983434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.738992929 CET4434983634.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.739140987 CET49835443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.739197969 CET49834443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.739201069 CET49836443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.743424892 CET49835443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.743482113 CET4434983534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.743751049 CET4434983534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.744893074 CET4434983734.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.745367050 CET49837443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.747176886 CET49834443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.747186899 CET4434983434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.747443914 CET4434983434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.750325918 CET49836443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.750358105 CET4434983634.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.750598907 CET4434983634.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.754092932 CET49837443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.754103899 CET4434983734.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.754463911 CET4434983734.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.759010077 CET49835443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.759063959 CET49835443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.759237051 CET4434983534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.759888887 CET49834443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.759915113 CET49836443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.760034084 CET49836443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.760076046 CET4434983434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.760094881 CET49834443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.760099888 CET4434983434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.760104895 CET4434983634.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.760487080 CET49835443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.760499001 CET49836443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.764545918 CET49837443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.764656067 CET49837443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.765145063 CET4434983734.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.767040014 CET49837443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.767857075 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.773233891 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.892668962 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.896414995 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.901966095 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.945425987 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.975333929 CET4434983434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.975554943 CET49834443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:03.020169020 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:03.061341047 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:08.877665997 CET4975480192.168.2.4142.250.186.99
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:08.882891893 CET8049754142.250.186.99192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:12.804148912 CET49757443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:12.804207087 CET4434975734.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:12.904220104 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:12.909625053 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:12.929177046 CET4434975734.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:12.974766016 CET49757443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:13.020126104 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:13.025712013 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:18.890400887 CET4975480192.168.2.4142.250.186.99
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:18.895788908 CET8049754142.250.186.99192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:22.922302008 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:22.927594900 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:23.038244963 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:23.043584108 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:28.902033091 CET4975480192.168.2.4142.250.186.99
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:28.907495022 CET8049754142.250.186.99192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:32.930107117 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:32.935656071 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:33.052293062 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:33.057785034 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:36.893089056 CET49948443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:36.893115997 CET4434994834.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:36.893326044 CET49948443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:36.895004988 CET49948443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:36.895016909 CET4434994834.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:36.921873093 CET4434994834.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:36.921989918 CET49948443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:36.922282934 CET49948443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:36.922301054 CET4434994834.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:38.915556908 CET4975480192.168.2.4142.250.186.99
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:38.920998096 CET8049754142.250.186.99192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:42.942372084 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:42.947688103 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:43.080265045 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:43.085576057 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:48.928757906 CET4975480192.168.2.4142.250.186.99
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:48.934273005 CET8049754142.250.186.99192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:52.955387115 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:52.960910082 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:53.087024927 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:53.092720985 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:58.940741062 CET4975480192.168.2.4142.250.186.99
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:58.946098089 CET8049754142.250.186.99192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:02.967791080 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:02.973211050 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:03.099252939 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:03.104578018 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:03.843265057 CET4975480192.168.2.4142.250.186.99
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:03.848939896 CET8049754142.250.186.99192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:03.849029064 CET4975480192.168.2.4142.250.186.99
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:12.727406025 CET49757443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:12.727488995 CET4434975734.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:12.855386972 CET4434975734.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:12.896619081 CET49757443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:12.999080896 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:13.004544020 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:13.128345966 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:13.133830070 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:23.018440962 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:23.024054050 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:23.140624046 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:23.146003962 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:33.027270079 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:33.032634020 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:33.158823967 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:33.164561033 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:43.042265892 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:43.049678087 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:43.180444956 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:43.185762882 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:53.058882952 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:53.064320087 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:53.190457106 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:53.195938110 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.262792110 CET49949443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.262844086 CET4434994934.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.263035059 CET49949443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.267935991 CET49949443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.267955065 CET4434994934.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.923100948 CET4434994934.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.923219919 CET49949443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.934060097 CET49949443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.934113979 CET4434994934.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.934187889 CET49949443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.934412956 CET4434994934.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.934510946 CET49949443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.938113928 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.944221020 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.944309950 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.946415901 CET4995080192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.951719999 CET804995034.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.951806068 CET4995080192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.952016115 CET4995080192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.957304001 CET804995034.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:58.529117107 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:58.535590887 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:58.535687923 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:58.557518005 CET804995034.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:58.562242031 CET4995180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:58.567575932 CET804995134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:58.567682981 CET4995180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:58.567822933 CET4995180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:58.573457956 CET804995134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:58.605098009 CET4995080192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:59.203246117 CET804995134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:59.245502949 CET4995180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.066742897 CET49952443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.066788912 CET4434995234.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.066951990 CET49953443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.067008018 CET4434995334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.067071915 CET49954443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.067080021 CET4434995434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.067250967 CET49952443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.067264080 CET49953443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.067277908 CET49954443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.067289114 CET49955443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.067298889 CET4434995534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.067380905 CET49955443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.067439079 CET49952443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.067455053 CET4434995234.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.067560911 CET49954443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.067572117 CET4434995434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.067634106 CET49953443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.067648888 CET4434995334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.067785978 CET49955443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.067800999 CET4434995534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.547039986 CET49757443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.547084093 CET4434975734.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.547203064 CET49757443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.547209978 CET4434975734.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.547240973 CET49757443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.547454119 CET4434975734.107.243.93192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.547550917 CET49757443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.675219059 CET4434995534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.675396919 CET49955443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.678169012 CET4434995234.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.678910017 CET49955443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.678920031 CET4434995534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.679171085 CET4434995534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.680191040 CET49952443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.682853937 CET49952443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.682862997 CET4434995234.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.683120012 CET4434995234.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.684376001 CET49955443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.684542894 CET4434995534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.684670925 CET49955443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.684678078 CET4434995534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.686144114 CET49952443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.686227083 CET49952443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.686244011 CET4434995334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.686314106 CET4434995234.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.687167883 CET49952443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.687186956 CET49953443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.689846039 CET49953443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.689851046 CET4434995334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.689963102 CET4995080192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.690126896 CET4434995334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.692543030 CET49953443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.692642927 CET49953443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.692707062 CET4434995334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.692775011 CET49953443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.695321083 CET804995034.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.706147909 CET4434995434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.706376076 CET49954443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.709775925 CET49954443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.709789038 CET4434995434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.710185051 CET4434995434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.712594032 CET49954443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.712728977 CET49954443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.712810993 CET4434995434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.712891102 CET49954443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.817013979 CET804995034.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.820257902 CET4995180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.825647116 CET804995134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.863171101 CET4995080192.168.2.434.107.221.82
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.891379118 CET4434995534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.891499043 CET49955443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.953489065 CET804995134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.994718075 CET4995180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:02.682832956 CET6148753192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:02.691591978 CET53614871.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:02.694600105 CET6150953192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:02.702673912 CET53615091.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:04.764671087 CET5877053192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:04.765579939 CET6296053192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:04.772548914 CET53587701.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:04.773994923 CET5389253192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:04.775110006 CET5978453192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:04.781893015 CET53538921.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:04.782991886 CET5208253192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:04.783140898 CET53597841.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:04.784739017 CET5410753192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:04.790215015 CET53520821.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:04.792666912 CET53541071.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.398180008 CET5788853192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.405972004 CET53578881.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.407418013 CET5401253192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.409508944 CET5606353192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.415680885 CET53540121.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.416949034 CET53560631.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.416974068 CET5651853192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.417594910 CET5599653192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.424509048 CET53565181.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.425122976 CET6018453192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.425443888 CET53559961.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.433125019 CET53601841.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.588124037 CET6153353192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.596497059 CET53615331.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.599246979 CET6082053192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.606765985 CET53608201.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.726075888 CET6174653192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.734183073 CET53617461.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.750729084 CET5349853192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.758352041 CET53534981.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.771413088 CET5639353192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.779267073 CET53563931.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.809369087 CET5978753192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.810343027 CET5612753192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.816730976 CET53597871.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.817637920 CET53561271.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.825546026 CET5288553192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.861634016 CET6218753192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.869798899 CET53621871.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.873136044 CET6260553192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.880243063 CET53626051.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.880816936 CET5781653192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.888091087 CET53578161.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.404392004 CET5382953192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.431165934 CET53621081.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.467955112 CET6257653192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.475161076 CET53625761.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.476667881 CET6462553192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.483755112 CET53646251.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.484668016 CET6373253192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.492785931 CET53637321.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.595561028 CET5848853192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.598015070 CET5192853192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.603037119 CET53584881.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.603643894 CET6350553192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.605432034 CET53519281.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.606512070 CET6450753192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.611534119 CET53635051.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.614016056 CET53645071.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.614583969 CET6402453192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.621834993 CET53640241.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.124217987 CET5580753192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.409254074 CET56970443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.722111940 CET56970443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.722148895 CET56970443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.323523045 CET56970443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.323553085 CET56970443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.323666096 CET4435697034.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.325617075 CET4435697034.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.325628996 CET4435697034.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.325640917 CET4435697034.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.325653076 CET4435697034.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.328013897 CET56970443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.330168009 CET56970443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.330204964 CET56970443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.448183060 CET4435697034.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.448409081 CET56970443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.454569101 CET4435697034.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.454612970 CET4435697034.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.455421925 CET56970443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:10.480206966 CET4435697034.117.188.166192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:11.775542974 CET6360953192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:11.783811092 CET53636091.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:11.790765047 CET6211853192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:11.798692942 CET53621181.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:11.801453114 CET6383753192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:11.809458971 CET53638371.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:12.901123047 CET5782653192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:12.946089983 CET5015853192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:12.953605890 CET53501581.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:16.907048941 CET5101353192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:16.914820910 CET53510131.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.050590992 CET6268353192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.050898075 CET5338553192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.051428080 CET5717853192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.058315039 CET53626831.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.058455944 CET53533851.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.059042931 CET53571781.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.059545040 CET6378053192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.067156076 CET53637801.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.567465067 CET6233953192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.567843914 CET5455553192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.567862988 CET5528953192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.574639082 CET53623391.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.575051069 CET53552891.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.575084925 CET53545551.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.576706886 CET6187753192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.576785088 CET5383753192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.576997042 CET6436853192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.584619045 CET53618771.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.585084915 CET53538371.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.585339069 CET53643681.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.592678070 CET6320653192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.592982054 CET5758353192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.600718021 CET53632061.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.601589918 CET53575831.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.603840113 CET6201153192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.612051964 CET53620111.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.612803936 CET5129853192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.620145082 CET53512981.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:23.981153965 CET5502453192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:23.994062901 CET53550241.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.449695110 CET5011053192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.457654953 CET53501101.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.486525059 CET6157353192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.494493008 CET53615731.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.500726938 CET5147753192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.502155066 CET6165553192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.508665085 CET53514771.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.510473013 CET53616551.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.513477087 CET5984153192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.514808893 CET5677653192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.521555901 CET53598411.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.522598028 CET53567761.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.524142981 CET6280553192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.532042027 CET53628051.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:34.652726889 CET6266153192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:34.660406113 CET53626611.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:34.662695885 CET5765153192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:34.669915915 CET53576511.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:55.943939924 CET6410053192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:55.951284885 CET53641001.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.296190977 CET5543853192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.304563999 CET53554381.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:36.883738041 CET4994953192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:36.891832113 CET53499491.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:36.893249035 CET5358353192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:36.900439978 CET53535831.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.243252993 CET6127253192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.251687050 CET53612721.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.253061056 CET6138253192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.261840105 CET53613821.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.262959957 CET5476453192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.270457983 CET53547641.1.1.1192.168.2.4
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.937922001 CET5728853192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.067099094 CET5351853192.168.2.41.1.1.1
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.075169086 CET53535181.1.1.1192.168.2.4
                                                                                                                                                                                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:02.682832956 CET192.168.2.41.1.1.10x11Standard query (0)prod.classify-client.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:02.694600105 CET192.168.2.41.1.1.10xacc2Standard query (0)prod.classify-client.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:04.764671087 CET192.168.2.41.1.1.10x68b6Standard query (0)youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:04.765579939 CET192.168.2.41.1.1.10xc210Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:04.773994923 CET192.168.2.41.1.1.10x9639Standard query (0)youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:04.775110006 CET192.168.2.41.1.1.10x8dc5Standard query (0)prod.detectportal.prod.cloudops.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:04.782991886 CET192.168.2.41.1.1.10x9b3Standard query (0)youtube.com28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:04.784739017 CET192.168.2.41.1.1.10xf318Standard query (0)prod.detectportal.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.398180008 CET192.168.2.41.1.1.10x3b25Standard query (0)contile.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.407418013 CET192.168.2.41.1.1.10xd98cStandard query (0)spocs.getpocket.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.409508944 CET192.168.2.41.1.1.10xa23Standard query (0)contile.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.416974068 CET192.168.2.41.1.1.10xbba3Standard query (0)prod.ads.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.417594910 CET192.168.2.41.1.1.10xd9c2Standard query (0)contile.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.425122976 CET192.168.2.41.1.1.10x678fStandard query (0)prod.ads.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.588124037 CET192.168.2.41.1.1.10xc28eStandard query (0)prod.balrog.prod.cloudops.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.599246979 CET192.168.2.41.1.1.10x9d98Standard query (0)prod.balrog.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.726075888 CET192.168.2.41.1.1.10xf74aStandard query (0)content-signature-2.cdn.mozilla.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.750729084 CET192.168.2.41.1.1.10xa38Standard query (0)prod.content-signature-chains.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.771413088 CET192.168.2.41.1.1.10xafaeStandard query (0)prod.content-signature-chains.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.809369087 CET192.168.2.41.1.1.10x2a81Standard query (0)example.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.810343027 CET192.168.2.41.1.1.10xe19aStandard query (0)ipv4only.arpaA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.825546026 CET192.168.2.41.1.1.10x9c86Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.861634016 CET192.168.2.41.1.1.10xecb8Standard query (0)o.pki.googA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.873136044 CET192.168.2.41.1.1.10x8990Standard query (0)pki-goog.l.google.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.880816936 CET192.168.2.41.1.1.10xbfa4Standard query (0)pki-goog.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.404392004 CET192.168.2.41.1.1.10x2a34Standard query (0)shavar.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.467955112 CET192.168.2.41.1.1.10x1d29Standard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.476667881 CET192.168.2.41.1.1.10xc000Standard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.484668016 CET192.168.2.41.1.1.10x71c0Standard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.595561028 CET192.168.2.41.1.1.10x939Standard query (0)telemetry-incoming.r53-2.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.598015070 CET192.168.2.41.1.1.10xed66Standard query (0)firefox.settings.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.603643894 CET192.168.2.41.1.1.10x3aa6Standard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.606512070 CET192.168.2.41.1.1.10xc066Standard query (0)prod.remote-settings.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.614583969 CET192.168.2.41.1.1.10xe69cStandard query (0)prod.remote-settings.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.124217987 CET192.168.2.41.1.1.10x6affStandard query (0)r10.o.lencr.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:11.775542974 CET192.168.2.41.1.1.10x9cd7Standard query (0)support.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:11.790765047 CET192.168.2.41.1.1.10x69c1Standard query (0)us-west1.prod.sumo.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:11.801453114 CET192.168.2.41.1.1.10xff7dStandard query (0)us-west1.prod.sumo.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:12.901123047 CET192.168.2.41.1.1.10x3d00Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:12.946089983 CET192.168.2.41.1.1.10x673bStandard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:16.907048941 CET192.168.2.41.1.1.10x3ddStandard query (0)www.youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.050590992 CET192.168.2.41.1.1.10xb9eaStandard query (0)www.facebook.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.050898075 CET192.168.2.41.1.1.10xa6b3Standard query (0)www.wikipedia.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.051428080 CET192.168.2.41.1.1.10x188bStandard query (0)youtube-ui.l.google.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.059545040 CET192.168.2.41.1.1.10x394bStandard query (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.567465067 CET192.168.2.41.1.1.10x9700Standard query (0)www.reddit.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.567843914 CET192.168.2.41.1.1.10x4245Standard query (0)star-mini.c10r.facebook.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.567862988 CET192.168.2.41.1.1.10x28f4Standard query (0)dyna.wikimedia.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.576706886 CET192.168.2.41.1.1.10xa636Standard query (0)dyna.wikimedia.org28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.576785088 CET192.168.2.41.1.1.10xc62bStandard query (0)reddit.map.fastly.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.576997042 CET192.168.2.41.1.1.10xb7d6Standard query (0)star-mini.c10r.facebook.com28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.592678070 CET192.168.2.41.1.1.10x576dStandard query (0)twitter.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.592982054 CET192.168.2.41.1.1.10x9cc7Standard query (0)reddit.map.fastly.net28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.603840113 CET192.168.2.41.1.1.10x93b5Standard query (0)twitter.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.612803936 CET192.168.2.41.1.1.10xd28cStandard query (0)twitter.com28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:23.981153965 CET192.168.2.41.1.1.10x9100Standard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.449695110 CET192.168.2.41.1.1.10xaa2aStandard query (0)prod.balrog.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.486525059 CET192.168.2.41.1.1.10xddb4Standard query (0)services.addons.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.500726938 CET192.168.2.41.1.1.10x6401Standard query (0)services.addons.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.502155066 CET192.168.2.41.1.1.10x9a2bStandard query (0)normandy.cdn.mozilla.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.513477087 CET192.168.2.41.1.1.10xb4cbStandard query (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.514808893 CET192.168.2.41.1.1.10x2ad3Standard query (0)normandy-cdn.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.524142981 CET192.168.2.41.1.1.10x5060Standard query (0)normandy-cdn.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:34.652726889 CET192.168.2.41.1.1.10xe14dStandard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:34.662695885 CET192.168.2.41.1.1.10xbe96Standard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:55.943939924 CET192.168.2.41.1.1.10xfeefStandard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.296190977 CET192.168.2.41.1.1.10xc98Standard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:36.883738041 CET192.168.2.41.1.1.10x633fStandard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:36.893249035 CET192.168.2.41.1.1.10xd079Standard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.243252993 CET192.168.2.41.1.1.10xf8a8Standard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.253061056 CET192.168.2.41.1.1.10xa405Standard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.262959957 CET192.168.2.41.1.1.10xaa1bStandard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.937922001 CET192.168.2.41.1.1.10xe18cStandard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.067099094 CET192.168.2.41.1.1.10x233eStandard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:02.669879913 CET1.1.1.1192.168.2.40x4d4aNo error (0)prod.classify-client.prod.webservices.mozgcp.net35.190.72.216A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:02.691591978 CET1.1.1.1192.168.2.40x11No error (0)prod.classify-client.prod.webservices.mozgcp.net35.190.72.216A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:04.772548914 CET1.1.1.1192.168.2.40x68b6No error (0)youtube.com142.250.185.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:04.772984982 CET1.1.1.1192.168.2.40xc210No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:04.772984982 CET1.1.1.1192.168.2.40xc210No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:04.781893015 CET1.1.1.1192.168.2.40x9639No error (0)youtube.com216.58.206.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:04.783140898 CET1.1.1.1192.168.2.40x8dc5No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:04.790215015 CET1.1.1.1192.168.2.40x9b3No error (0)youtube.com28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:04.792666912 CET1.1.1.1192.168.2.40xf318No error (0)prod.detectportal.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.405972004 CET1.1.1.1192.168.2.40x3b25No error (0)contile.services.mozilla.com34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.415680885 CET1.1.1.1192.168.2.40xd98cNo error (0)spocs.getpocket.comprod.ads.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.415680885 CET1.1.1.1192.168.2.40xd98cNo error (0)prod.ads.prod.webservices.mozgcp.net34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.416949034 CET1.1.1.1192.168.2.40xa23No error (0)contile.services.mozilla.com34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.424509048 CET1.1.1.1192.168.2.40xbba3No error (0)prod.ads.prod.webservices.mozgcp.net34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.586291075 CET1.1.1.1192.168.2.40xe42cNo error (0)balrog-aus5.r53-2.services.mozilla.comprod.balrog.prod.cloudops.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.586291075 CET1.1.1.1192.168.2.40xe42cNo error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.596497059 CET1.1.1.1192.168.2.40xc28eNo error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.734183073 CET1.1.1.1192.168.2.40xf74aNo error (0)content-signature-2.cdn.mozilla.netcontent-signature-chains.prod.autograph.services.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.734183073 CET1.1.1.1192.168.2.40xf74aNo error (0)content-signature-chains.prod.autograph.services.mozaws.netprod.content-signature-chains.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.734183073 CET1.1.1.1192.168.2.40xf74aNo error (0)prod.content-signature-chains.prod.webservices.mozgcp.net34.160.144.191A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.758352041 CET1.1.1.1192.168.2.40xa38No error (0)prod.content-signature-chains.prod.webservices.mozgcp.net34.160.144.191A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.779267073 CET1.1.1.1192.168.2.40xafaeNo error (0)prod.content-signature-chains.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.816730976 CET1.1.1.1192.168.2.40x2a81No error (0)example.org93.184.215.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.817637920 CET1.1.1.1192.168.2.40xe19aNo error (0)ipv4only.arpa192.0.0.170A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.817637920 CET1.1.1.1192.168.2.40xe19aNo error (0)ipv4only.arpa192.0.0.171A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.834992886 CET1.1.1.1192.168.2.40x9c86No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.834992886 CET1.1.1.1192.168.2.40x9c86No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.869798899 CET1.1.1.1192.168.2.40xecb8No error (0)o.pki.googpki-goog.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.869798899 CET1.1.1.1192.168.2.40xecb8No error (0)pki-goog.l.google.com142.250.186.99A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.880243063 CET1.1.1.1192.168.2.40x8990No error (0)pki-goog.l.google.com172.217.16.195A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.888091087 CET1.1.1.1192.168.2.40xbfa4No error (0)pki-goog.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.411689997 CET1.1.1.1192.168.2.40x2a34No error (0)shavar.services.mozilla.comshavar.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.475161076 CET1.1.1.1192.168.2.40x1d29No error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.483755112 CET1.1.1.1192.168.2.40xc000No error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.592747927 CET1.1.1.1192.168.2.40xaa28No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.603037119 CET1.1.1.1192.168.2.40x939No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.605432034 CET1.1.1.1192.168.2.40xed66No error (0)firefox.settings.services.mozilla.comprod.remote-settings.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.605432034 CET1.1.1.1192.168.2.40xed66No error (0)prod.remote-settings.prod.webservices.mozgcp.net34.149.100.209A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.614016056 CET1.1.1.1192.168.2.40xc066No error (0)prod.remote-settings.prod.webservices.mozgcp.net34.149.100.209A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.720347881 CET1.1.1.1192.168.2.40x15eeNo error (0)balrog-aus5.r53-2.services.mozilla.comprod.balrog.prod.cloudops.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.720347881 CET1.1.1.1192.168.2.40x15eeNo error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.131942987 CET1.1.1.1192.168.2.40x6affNo error (0)r10.o.lencr.orgo.lencr.edgesuite.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.245368004 CET1.1.1.1192.168.2.40xb4bNo error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:11.783811092 CET1.1.1.1192.168.2.40x9cd7No error (0)support.mozilla.orgprod.sumo.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:11.783811092 CET1.1.1.1192.168.2.40x9cd7No error (0)prod.sumo.prod.webservices.mozgcp.netus-west1.prod.sumo.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:11.783811092 CET1.1.1.1192.168.2.40x9cd7No error (0)us-west1.prod.sumo.prod.webservices.mozgcp.net34.149.128.2A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:11.798692942 CET1.1.1.1192.168.2.40x69c1No error (0)us-west1.prod.sumo.prod.webservices.mozgcp.net34.149.128.2A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:12.908485889 CET1.1.1.1192.168.2.40x3d00No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:12.908485889 CET1.1.1.1192.168.2.40x3d00No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:16.914820910 CET1.1.1.1192.168.2.40x3ddNo error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:16.914820910 CET1.1.1.1192.168.2.40x3ddNo error (0)youtube-ui.l.google.com142.250.186.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:16.914820910 CET1.1.1.1192.168.2.40x3ddNo error (0)youtube-ui.l.google.com142.250.185.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:16.914820910 CET1.1.1.1192.168.2.40x3ddNo error (0)youtube-ui.l.google.com216.58.206.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:16.914820910 CET1.1.1.1192.168.2.40x3ddNo error (0)youtube-ui.l.google.com142.250.186.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:16.914820910 CET1.1.1.1192.168.2.40x3ddNo error (0)youtube-ui.l.google.com142.250.185.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:16.914820910 CET1.1.1.1192.168.2.40x3ddNo error (0)youtube-ui.l.google.com142.250.185.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:16.914820910 CET1.1.1.1192.168.2.40x3ddNo error (0)youtube-ui.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:16.914820910 CET1.1.1.1192.168.2.40x3ddNo error (0)youtube-ui.l.google.com216.58.206.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:16.914820910 CET1.1.1.1192.168.2.40x3ddNo error (0)youtube-ui.l.google.com142.250.184.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:16.914820910 CET1.1.1.1192.168.2.40x3ddNo error (0)youtube-ui.l.google.com142.250.185.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:16.914820910 CET1.1.1.1192.168.2.40x3ddNo error (0)youtube-ui.l.google.com172.217.18.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:16.914820910 CET1.1.1.1192.168.2.40x3ddNo error (0)youtube-ui.l.google.com142.250.186.174A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:16.914820910 CET1.1.1.1192.168.2.40x3ddNo error (0)youtube-ui.l.google.com142.250.185.174A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:16.914820910 CET1.1.1.1192.168.2.40x3ddNo error (0)youtube-ui.l.google.com142.250.186.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:16.914820910 CET1.1.1.1192.168.2.40x3ddNo error (0)youtube-ui.l.google.com142.250.185.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:16.914820910 CET1.1.1.1192.168.2.40x3ddNo error (0)youtube-ui.l.google.com142.250.181.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.058315039 CET1.1.1.1192.168.2.40xb9eaNo error (0)www.facebook.comstar-mini.c10r.facebook.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.058315039 CET1.1.1.1192.168.2.40xb9eaNo error (0)star-mini.c10r.facebook.com157.240.253.35A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.058455944 CET1.1.1.1192.168.2.40xa6b3No error (0)www.wikipedia.orgdyna.wikimedia.orgCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.058455944 CET1.1.1.1192.168.2.40xa6b3No error (0)dyna.wikimedia.org185.15.59.224A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.059042931 CET1.1.1.1192.168.2.40x188bNo error (0)youtube-ui.l.google.com216.58.212.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.059042931 CET1.1.1.1192.168.2.40x188bNo error (0)youtube-ui.l.google.com142.250.186.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.059042931 CET1.1.1.1192.168.2.40x188bNo error (0)youtube-ui.l.google.com142.250.185.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.059042931 CET1.1.1.1192.168.2.40x188bNo error (0)youtube-ui.l.google.com216.58.212.174A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.059042931 CET1.1.1.1192.168.2.40x188bNo error (0)youtube-ui.l.google.com172.217.18.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.059042931 CET1.1.1.1192.168.2.40x188bNo error (0)youtube-ui.l.google.com142.250.186.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.059042931 CET1.1.1.1192.168.2.40x188bNo error (0)youtube-ui.l.google.com142.250.181.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.059042931 CET1.1.1.1192.168.2.40x188bNo error (0)youtube-ui.l.google.com142.250.185.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.059042931 CET1.1.1.1192.168.2.40x188bNo error (0)youtube-ui.l.google.com142.250.185.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.059042931 CET1.1.1.1192.168.2.40x188bNo error (0)youtube-ui.l.google.com142.250.184.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.059042931 CET1.1.1.1192.168.2.40x188bNo error (0)youtube-ui.l.google.com142.250.185.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.059042931 CET1.1.1.1192.168.2.40x188bNo error (0)youtube-ui.l.google.com142.250.186.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.059042931 CET1.1.1.1192.168.2.40x188bNo error (0)youtube-ui.l.google.com142.250.185.174A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.059042931 CET1.1.1.1192.168.2.40x188bNo error (0)youtube-ui.l.google.com142.250.185.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.059042931 CET1.1.1.1192.168.2.40x188bNo error (0)youtube-ui.l.google.com142.250.74.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.059042931 CET1.1.1.1192.168.2.40x188bNo error (0)youtube-ui.l.google.com216.58.206.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.067156076 CET1.1.1.1192.168.2.40x394bNo error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.067156076 CET1.1.1.1192.168.2.40x394bNo error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.067156076 CET1.1.1.1192.168.2.40x394bNo error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.067156076 CET1.1.1.1192.168.2.40x394bNo error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.574639082 CET1.1.1.1192.168.2.40x9700No error (0)www.reddit.comreddit.map.fastly.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.574639082 CET1.1.1.1192.168.2.40x9700No error (0)reddit.map.fastly.net151.101.193.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.574639082 CET1.1.1.1192.168.2.40x9700No error (0)reddit.map.fastly.net151.101.129.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.574639082 CET1.1.1.1192.168.2.40x9700No error (0)reddit.map.fastly.net151.101.65.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.574639082 CET1.1.1.1192.168.2.40x9700No error (0)reddit.map.fastly.net151.101.1.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.575051069 CET1.1.1.1192.168.2.40x28f4No error (0)dyna.wikimedia.org185.15.59.224A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.575084925 CET1.1.1.1192.168.2.40x4245No error (0)star-mini.c10r.facebook.com157.240.253.35A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.584619045 CET1.1.1.1192.168.2.40xa636No error (0)dyna.wikimedia.org28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.585084915 CET1.1.1.1192.168.2.40xc62bNo error (0)reddit.map.fastly.net151.101.129.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.585084915 CET1.1.1.1192.168.2.40xc62bNo error (0)reddit.map.fastly.net151.101.193.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.585084915 CET1.1.1.1192.168.2.40xc62bNo error (0)reddit.map.fastly.net151.101.1.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.585084915 CET1.1.1.1192.168.2.40xc62bNo error (0)reddit.map.fastly.net151.101.65.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.585339069 CET1.1.1.1192.168.2.40xb7d6No error (0)star-mini.c10r.facebook.com28IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.600718021 CET1.1.1.1192.168.2.40x576dNo error (0)twitter.com104.244.42.193A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.612051964 CET1.1.1.1192.168.2.40x93b5No error (0)twitter.com104.244.42.65A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.494493008 CET1.1.1.1192.168.2.40xddb4No error (0)services.addons.mozilla.org151.101.65.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.494493008 CET1.1.1.1192.168.2.40xddb4No error (0)services.addons.mozilla.org151.101.193.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.494493008 CET1.1.1.1192.168.2.40xddb4No error (0)services.addons.mozilla.org151.101.129.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.494493008 CET1.1.1.1192.168.2.40xddb4No error (0)services.addons.mozilla.org151.101.1.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.508665085 CET1.1.1.1192.168.2.40x6401No error (0)services.addons.mozilla.org151.101.65.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.508665085 CET1.1.1.1192.168.2.40x6401No error (0)services.addons.mozilla.org151.101.1.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.508665085 CET1.1.1.1192.168.2.40x6401No error (0)services.addons.mozilla.org151.101.129.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.508665085 CET1.1.1.1192.168.2.40x6401No error (0)services.addons.mozilla.org151.101.193.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.510473013 CET1.1.1.1192.168.2.40x9a2bNo error (0)normandy.cdn.mozilla.netnormandy-cdn.services.mozilla.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.510473013 CET1.1.1.1192.168.2.40x9a2bNo error (0)normandy-cdn.services.mozilla.com35.201.103.21A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:31.522598028 CET1.1.1.1192.168.2.40x2ad3No error (0)normandy-cdn.services.mozilla.com35.201.103.21A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.782084942 CET1.1.1.1192.168.2.40x6cf6No error (0)a21ed24aedde648804e7-228765c84088fef4ff5e70f2710398e9.r17.cf1.rackcdn.coma17.rackcdn.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.782084942 CET1.1.1.1192.168.2.40x6cf6No error (0)a17.rackcdn.coma17.rackcdn.com.mdc.edgesuite.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:34.660406113 CET1.1.1.1192.168.2.40xe14dNo error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:01.285748959 CET1.1.1.1192.168.2.40xde29No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:36.891832113 CET1.1.1.1192.168.2.40x633fNo error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.251687050 CET1.1.1.1192.168.2.40xf8a8No error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.261840105 CET1.1.1.1192.168.2.40xa405No error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.945368052 CET1.1.1.1192.168.2.40xe18cNo error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.945368052 CET1.1.1.1192.168.2.40xe18cNo error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.065341949 CET1.1.1.1192.168.2.40xe763No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                • detectportal.firefox.com
                                                                                                                                                                                                                                                • o.pki.goog
                                                                                                                                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                0192.168.2.44974034.107.221.82807848C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.022821903 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.626394987 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                                Age: 59840
                                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>


                                                                                                                                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                1192.168.2.44974534.107.221.82807848C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:05.871967077 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.468910933 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                                Age: 73859
                                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                Data Ascii: success


                                                                                                                                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                2192.168.2.44975134.107.221.82807848C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:06.525012970 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.119738102 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                                Age: 59842
                                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.868671894 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.993057013 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                                Age: 59842
                                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.234703064 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.360517979 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                                Age: 59844
                                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.465112925 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.589767933 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                                Age: 59844
                                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:12.944601059 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:13.093656063 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                                Age: 59848
                                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.895710945 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:18.020723104 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                                Age: 59852
                                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:24.618608952 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:24.743812084 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                                Age: 59859
                                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.074088097 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.198983908 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                                Age: 59867
                                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.762227058 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.887126923 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                                Age: 59867
                                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:35.297277927 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:35.421905041 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                                Age: 59870
                                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:41.192073107 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:41.320166111 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                                Age: 59876
                                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:51.335963011 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:56.579926014 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:56.704933882 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                                Age: 59891
                                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.050990105 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.175856113 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                                Age: 59897
                                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.767857075 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.892668962 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                                Age: 59897
                                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:12.904220104 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:22.922302008 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:32.930107117 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:42.942372084 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:52.955387115 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:02.967791080 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:12.999080896 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:23.018440962 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:33.027270079 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:


                                                                                                                                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                3192.168.2.44975334.107.221.82807848C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.870238066 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Cache-Control: no-cache


                                                                                                                                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                4192.168.2.449754142.250.186.99807848C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:07.879364014 CET429OUTPOST /s/wr3/yvU HTTP/1.1
                                                                                                                                                                                                                                                Host: o.pki.goog
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Content-Type: application/ocsp-request
                                                                                                                                                                                                                                                Content-Length: 84
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Data Raw: 30 52 30 50 30 4e 30 4c 30 4a 30 09 06 05 2b 0e 03 02 1a 05 00 04 14 12 ab 48 b9 b7 63 da 7e 2d 86 c3 db b3 c2 77 3b 29 37 2d 5a 04 14 c7 81 f5 fd 8e 88 d9 00 3c 4d 63 a2 50 31 24 a0 ce 23 fe 23 02 11 00 ca f5 66 f3 89 88 42 59 09 d1 26 77 8f 29 a2 0c
                                                                                                                                                                                                                                                Data Ascii: 0R0P0N0L0J0+Hc~-w;)7-Z<McP1$##fBY&w)
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.749701977 CET1105INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Content-Type: application/ocsp-response
                                                                                                                                                                                                                                                Date: Mon, 28 Oct 2024 07:42:08 GMT
                                                                                                                                                                                                                                                Cache-Control: public, max-age=14400
                                                                                                                                                                                                                                                Content-Security-Policy-Report-Only: script-src 'none'; form-action 'none'; frame-src 'none'; report-uri https://csp.withgoogle.com/csp/scaffolding/sytroprc:52:0
                                                                                                                                                                                                                                                Cross-Origin-Opener-Policy-Report-Only: same-origin; report-to=coop_reporting
                                                                                                                                                                                                                                                Report-To: {"group":"coop_reporting","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/scaffolding/sytroprc:52:0"}],}
                                                                                                                                                                                                                                                Server: scaffolding on HTTPServer2
                                                                                                                                                                                                                                                Content-Length: 472
                                                                                                                                                                                                                                                X-XSS-Protection: 0
                                                                                                                                                                                                                                                X-Frame-Options: SAMEORIGIN
                                                                                                                                                                                                                                                Data Raw: 30 82 01 d4 0a 01 00 a0 82 01 cd 30 82 01 c9 06 09 2b 06 01 05 05 07 30 01 01 04 82 01 ba 30 82 01 b6 30 81 9f a2 16 04 14 c7 81 f5 fd 8e 88 d9 00 3c 4d 63 a2 50 31 24 a0 ce 23 fe 23 18 0f 32 30 32 34 31 30 32 38 30 32 30 38 30 39 5a 30 74 30 72 30 4a 30 09 06 05 2b 0e 03 02 1a 05 00 04 14 12 ab 48 b9 b7 63 da 7e 2d 86 c3 db b3 c2 77 3b 29 37 2d 5a 04 14 c7 81 f5 fd 8e 88 d9 00 3c 4d 63 a2 50 31 24 a0 ce 23 fe 23 02 11 00 ca f5 66 f3 89 88 42 59 09 d1 26 77 8f 29 a2 0c 80 00 18 0f 32 30 32 34 31 30 32 38 30 32 30 38 30 39 5a a0 11 18 0f 32 30 32 34 31 31 30 34 30 31 30 38 30 38 5a 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 1f 4a 39 2c bf 7d 25 06 e4 ea 52 95 4e 3a ff ed 5d 2a 48 65 2d 6a c8 a7 a2 c7 a4 fc 3e 30 5d a5 8d 8d fd 5f 6d 08 51 f2 b4 4a 93 ec a3 b3 13 a7 80 60 85 d0 35 4c 15 6a a2 61 ae 27 20 76 28 0f 7e fc 5c f5 df 60 d3 92 83 e3 a6 bb 91 50 44 4a 19 cc e6 67 55 ec 3d bd 62 2d ef f6 fb 9c 45 6c 61 c3 c3 f2 4d 50 ef 07 4c ba a4 e1 a8 42 fb 54 53 51 d5 65 c5 07 34 6e d8 38 [TRUNCATED]
                                                                                                                                                                                                                                                Data Ascii: 00+000<McP1$##20241028020809Z0t0r0J0+Hc~-w;)7-Z<McP1$##fBY&w)20241028020809Z20241104010808Z0*HJ9,}%RN:]*He-j>0]_mQJ`5Lja' v(~\`PDJgU=b-ElaMPLBTSQe4n8 IM120R<KK/?'u2>O)CS#09=)G.:i/Gh|yht|d)i6h]8ZT?R[f
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:18.768580914 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:28.818222046 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:38.830009937 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:48.857640028 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:58.869137049 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:08.877665997 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:18.890400887 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:28.902033091 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:38.915556908 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:48.928757906 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:


                                                                                                                                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                5192.168.2.44975534.107.221.82807848C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.102576971 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:08.691250086 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                                Age: 73861
                                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.417622089 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:09.541032076 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                                Age: 73862
                                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:12.882314920 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:13.006701946 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                                Age: 73865
                                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.667032003 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:17.790985107 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                                Age: 73870
                                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:18.696161985 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:18.929003000 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                                Age: 73871
                                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:24.748441935 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:24.872643948 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                                Age: 73877
                                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.201951981 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.325901031 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                                Age: 73885
                                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:32.892882109 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:33.016658068 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                                Age: 73885
                                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:35.427294016 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:35.550726891 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                                Age: 73888
                                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:41.323062897 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:41.446913958 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                                Age: 73894
                                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:51.451844931 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:56.708050013 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Oct 28, 2024 08:42:56.832784891 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                                Age: 73909
                                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.208678961 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.363234043 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                                Age: 73915
                                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:02.896414995 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:03.020169020 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                                Age: 73915
                                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:13.020126104 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:23.038244963 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:33.052293062 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:43.080265045 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                                Oct 28, 2024 08:43:53.087024927 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:03.099252939 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:13.128345966 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:23.140624046 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:33.158823967 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                Data Ascii:


                                                                                                                                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                6192.168.2.44995034.107.221.82807848C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:57.952016115 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:58.557518005 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                                Age: 60013
                                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.689963102 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.817013979 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                                Age: 60018
                                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>


                                                                                                                                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                7192.168.2.44995134.107.221.82807848C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:58.567822933 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Oct 28, 2024 08:44:59.203246117 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                                Age: 74032
                                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.820257902 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                                Oct 28, 2024 08:45:03.953489065 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                                Age: 74036
                                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                Data Ascii: success


                                                                                                                                                                                                                                                Click to jump to process

                                                                                                                                                                                                                                                Click to jump to process

                                                                                                                                                                                                                                                Click to dive into process behavior distribution

                                                                                                                                                                                                                                                Click to jump to process

                                                                                                                                                                                                                                                Target ID:0
                                                                                                                                                                                                                                                Start time:03:41:55
                                                                                                                                                                                                                                                Start date:28/10/2024
                                                                                                                                                                                                                                                Path:C:\Users\user\Desktop\file.exe
                                                                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                                                                Commandline:"C:\Users\user\Desktop\file.exe"
                                                                                                                                                                                                                                                Imagebase:0xc10000
                                                                                                                                                                                                                                                File size:919'552 bytes
                                                                                                                                                                                                                                                MD5 hash:F7BE8753894E3B1F1829C067805E430A
                                                                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                Reputation:low
                                                                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                                                                Target ID:1
                                                                                                                                                                                                                                                Start time:03:41:55
                                                                                                                                                                                                                                                Start date:28/10/2024
                                                                                                                                                                                                                                                Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                                                                Commandline:taskkill /F /IM firefox.exe /T
                                                                                                                                                                                                                                                Imagebase:0x2e0000
                                                                                                                                                                                                                                                File size:74'240 bytes
                                                                                                                                                                                                                                                MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                                                                Target ID:2
                                                                                                                                                                                                                                                Start time:03:41:55
                                                                                                                                                                                                                                                Start date:28/10/2024
                                                                                                                                                                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                Imagebase:0x7ff7699e0000
                                                                                                                                                                                                                                                File size:862'208 bytes
                                                                                                                                                                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                                                                Target ID:3
                                                                                                                                                                                                                                                Start time:03:41:58
                                                                                                                                                                                                                                                Start date:28/10/2024
                                                                                                                                                                                                                                                Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                                                                Commandline:taskkill /F /IM chrome.exe /T
                                                                                                                                                                                                                                                Imagebase:0x2e0000
                                                                                                                                                                                                                                                File size:74'240 bytes
                                                                                                                                                                                                                                                MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                                                                Target ID:4
                                                                                                                                                                                                                                                Start time:03:41:58
                                                                                                                                                                                                                                                Start date:28/10/2024
                                                                                                                                                                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                Imagebase:0x7ff7699e0000
                                                                                                                                                                                                                                                File size:862'208 bytes
                                                                                                                                                                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                                                                Target ID:5
                                                                                                                                                                                                                                                Start time:03:41:58
                                                                                                                                                                                                                                                Start date:28/10/2024
                                                                                                                                                                                                                                                Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                                                                Commandline:taskkill /F /IM msedge.exe /T
                                                                                                                                                                                                                                                Imagebase:0x2e0000
                                                                                                                                                                                                                                                File size:74'240 bytes
                                                                                                                                                                                                                                                MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                                                                Target ID:6
                                                                                                                                                                                                                                                Start time:03:41:58
                                                                                                                                                                                                                                                Start date:28/10/2024
                                                                                                                                                                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                Imagebase:0x7ff7699e0000
                                                                                                                                                                                                                                                File size:862'208 bytes
                                                                                                                                                                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                                                                Target ID:7
                                                                                                                                                                                                                                                Start time:03:41:58
                                                                                                                                                                                                                                                Start date:28/10/2024
                                                                                                                                                                                                                                                Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                                                                Commandline:taskkill /F /IM opera.exe /T
                                                                                                                                                                                                                                                Imagebase:0x2e0000
                                                                                                                                                                                                                                                File size:74'240 bytes
                                                                                                                                                                                                                                                MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                                                                Target ID:8
                                                                                                                                                                                                                                                Start time:03:41:58
                                                                                                                                                                                                                                                Start date:28/10/2024
                                                                                                                                                                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                Imagebase:0x7ff7699e0000
                                                                                                                                                                                                                                                File size:862'208 bytes
                                                                                                                                                                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                                                                Target ID:9
                                                                                                                                                                                                                                                Start time:03:41:58
                                                                                                                                                                                                                                                Start date:28/10/2024
                                                                                                                                                                                                                                                Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                                                                Commandline:taskkill /F /IM brave.exe /T
                                                                                                                                                                                                                                                Imagebase:0x2e0000
                                                                                                                                                                                                                                                File size:74'240 bytes
                                                                                                                                                                                                                                                MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                                                                Target ID:10
                                                                                                                                                                                                                                                Start time:03:41:58
                                                                                                                                                                                                                                                Start date:28/10/2024
                                                                                                                                                                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                Imagebase:0x7ff7699e0000
                                                                                                                                                                                                                                                File size:862'208 bytes
                                                                                                                                                                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                                                                Target ID:11
                                                                                                                                                                                                                                                Start time:03:41:58
                                                                                                                                                                                                                                                Start date:28/10/2024
                                                                                                                                                                                                                                                Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                                                                Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                                                                                                                                                                                Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                                File size:676'768 bytes
                                                                                                                                                                                                                                                MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                                                                Target ID:12
                                                                                                                                                                                                                                                Start time:03:41:59
                                                                                                                                                                                                                                                Start date:28/10/2024
                                                                                                                                                                                                                                                Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                                                                Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
                                                                                                                                                                                                                                                Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                                File size:676'768 bytes
                                                                                                                                                                                                                                                MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                                                                Target ID:13
                                                                                                                                                                                                                                                Start time:03:41:59
                                                                                                                                                                                                                                                Start date:28/10/2024
                                                                                                                                                                                                                                                Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                                                                Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                                                                                                                                                                                Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                                File size:676'768 bytes
                                                                                                                                                                                                                                                MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                                                                Target ID:15
                                                                                                                                                                                                                                                Start time:03:41:59
                                                                                                                                                                                                                                                Start date:28/10/2024
                                                                                                                                                                                                                                                Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                                                                Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2280 -parentBuildID 20230927232528 -prefsHandle 2224 -prefMapHandle 2208 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0d8a1b39-e660-4dac-b240-ef4997528783} 7848 "\\.\pipe\gecko-crash-server-pipe.7848" 20e3e06dd10 socket
                                                                                                                                                                                                                                                Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                                File size:676'768 bytes
                                                                                                                                                                                                                                                MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                                                                Target ID:16
                                                                                                                                                                                                                                                Start time:03:42:01
                                                                                                                                                                                                                                                Start date:28/10/2024
                                                                                                                                                                                                                                                Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                                                                Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4236 -parentBuildID 20230927232528 -prefsHandle 4132 -prefMapHandle 4228 -prefsLen 26208 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {682e83fa-bff4-48c5-9ba5-30aa68b48bf0} 7848 "\\.\pipe\gecko-crash-server-pipe.7848" 20e3e083610 rdd
                                                                                                                                                                                                                                                Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                                File size:676'768 bytes
                                                                                                                                                                                                                                                MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                                                                Target ID:17
                                                                                                                                                                                                                                                Start time:03:42:07
                                                                                                                                                                                                                                                Start date:28/10/2024
                                                                                                                                                                                                                                                Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                                                                Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5108 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5100 -prefMapHandle 5096 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c5983122-0af4-4d78-a131-0565779d2050} 7848 "\\.\pipe\gecko-crash-server-pipe.7848" 20e58f22910 utility
                                                                                                                                                                                                                                                Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                                File size:676'768 bytes
                                                                                                                                                                                                                                                MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                                                                Reset < >

                                                                                                                                                                                                                                                  Execution Graph

                                                                                                                                                                                                                                                  Execution Coverage:2.1%
                                                                                                                                                                                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                                                                  Signature Coverage:4.3%
                                                                                                                                                                                                                                                  Total number of Nodes:1542
                                                                                                                                                                                                                                                  Total number of Limit Nodes:52
                                                                                                                                                                                                                                                  execution_graph 95007 c52ba5 95008 c12b25 95007->95008 95009 c52baf 95007->95009 95035 c12b83 7 API calls 95008->95035 95053 c13a5a 95009->95053 95012 c52bb8 95060 c19cb3 95012->95060 95016 c12b2f 95023 c12b44 95016->95023 95039 c13837 95016->95039 95017 c52bc6 95018 c52bf5 95017->95018 95019 c52bce 95017->95019 95022 c133c6 22 API calls 95018->95022 95066 c133c6 95019->95066 95025 c52bf1 GetForegroundWindow ShellExecuteW 95022->95025 95026 c12b5f 95023->95026 95049 c130f2 95023->95049 95031 c52c26 95025->95031 95033 c12b66 SetCurrentDirectoryW 95026->95033 95030 c52be7 95032 c133c6 22 API calls 95030->95032 95031->95026 95032->95025 95034 c12b7a 95033->95034 95076 c12cd4 7 API calls 95035->95076 95037 c12b2a 95038 c12c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 95037->95038 95038->95016 95040 c13862 ___scrt_fastfail 95039->95040 95077 c14212 95040->95077 95043 c138e8 95045 c53386 Shell_NotifyIconW 95043->95045 95046 c13906 Shell_NotifyIconW 95043->95046 95081 c13923 95046->95081 95048 c1391c 95048->95023 95050 c13154 95049->95050 95051 c13104 ___scrt_fastfail 95049->95051 95050->95026 95052 c13123 Shell_NotifyIconW 95051->95052 95052->95050 95170 c51f50 95053->95170 95056 c19cb3 22 API calls 95057 c13a8d 95056->95057 95172 c13aa2 95057->95172 95059 c13a97 95059->95012 95061 c19cc2 _wcslen 95060->95061 95062 c2fe0b 22 API calls 95061->95062 95063 c19cea __fread_nolock 95062->95063 95064 c2fddb 22 API calls 95063->95064 95065 c19d00 95064->95065 95065->95017 95067 c133dd 95066->95067 95068 c530bb 95066->95068 95192 c133ee 95067->95192 95070 c2fddb 22 API calls 95068->95070 95072 c530c5 _wcslen 95070->95072 95071 c133e8 95075 c16350 22 API calls 95071->95075 95073 c2fe0b 22 API calls 95072->95073 95074 c530fe __fread_nolock 95073->95074 95075->95030 95076->95037 95078 c535a4 95077->95078 95079 c138b7 95077->95079 95078->95079 95080 c535ad DestroyIcon 95078->95080 95079->95043 95103 c7c874 42 API calls _strftime 95079->95103 95080->95079 95082 c13a13 95081->95082 95083 c1393f 95081->95083 95082->95048 95104 c16270 95083->95104 95086 c53393 LoadStringW 95089 c533ad 95086->95089 95087 c1395a 95109 c16b57 95087->95109 95097 c13994 ___scrt_fastfail 95089->95097 95122 c1a8c7 22 API calls __fread_nolock 95089->95122 95090 c1396f 95091 c533c9 95090->95091 95092 c1397c 95090->95092 95123 c16350 22 API calls 95091->95123 95092->95089 95094 c13986 95092->95094 95121 c16350 22 API calls 95094->95121 95100 c139f9 Shell_NotifyIconW 95097->95100 95098 c533d7 95098->95097 95099 c133c6 22 API calls 95098->95099 95101 c533f9 95099->95101 95100->95082 95102 c133c6 22 API calls 95101->95102 95102->95097 95103->95043 95124 c2fe0b 95104->95124 95106 c16295 95134 c2fddb 95106->95134 95108 c1394d 95108->95086 95108->95087 95110 c54ba1 95109->95110 95111 c16b67 _wcslen 95109->95111 95160 c193b2 95110->95160 95114 c16ba2 95111->95114 95115 c16b7d 95111->95115 95113 c54baa 95113->95113 95117 c2fddb 22 API calls 95114->95117 95159 c16f34 22 API calls 95115->95159 95119 c16bae 95117->95119 95118 c16b85 __fread_nolock 95118->95090 95120 c2fe0b 22 API calls 95119->95120 95120->95118 95121->95097 95122->95097 95123->95098 95126 c2fddb 95124->95126 95127 c2fdfa 95126->95127 95130 c2fdfc 95126->95130 95144 c3ea0c 95126->95144 95151 c34ead 7 API calls 2 library calls 95126->95151 95127->95106 95129 c3066d 95153 c332a4 RaiseException 95129->95153 95130->95129 95152 c332a4 RaiseException 95130->95152 95133 c3068a 95133->95106 95136 c2fde0 95134->95136 95135 c3ea0c ___std_exception_copy 21 API calls 95135->95136 95136->95135 95137 c2fdfa 95136->95137 95140 c2fdfc 95136->95140 95156 c34ead 7 API calls 2 library calls 95136->95156 95137->95108 95139 c3066d 95158 c332a4 RaiseException 95139->95158 95140->95139 95157 c332a4 RaiseException 95140->95157 95143 c3068a 95143->95108 95149 c43820 __dosmaperr 95144->95149 95145 c4385e 95155 c3f2d9 20 API calls __dosmaperr 95145->95155 95147 c43849 RtlAllocateHeap 95148 c4385c 95147->95148 95147->95149 95148->95126 95149->95145 95149->95147 95154 c34ead 7 API calls 2 library calls 95149->95154 95151->95126 95152->95129 95153->95133 95154->95149 95155->95148 95156->95136 95157->95139 95158->95143 95159->95118 95161 c193c0 95160->95161 95162 c193c9 __fread_nolock 95160->95162 95161->95162 95164 c1aec9 95161->95164 95162->95113 95162->95162 95165 c1aedc 95164->95165 95169 c1aed9 __fread_nolock 95164->95169 95166 c2fddb 22 API calls 95165->95166 95167 c1aee7 95166->95167 95168 c2fe0b 22 API calls 95167->95168 95168->95169 95169->95162 95171 c13a67 GetModuleFileNameW 95170->95171 95171->95056 95173 c51f50 __wsopen_s 95172->95173 95174 c13aaf GetFullPathNameW 95173->95174 95175 c13ae9 95174->95175 95176 c13ace 95174->95176 95186 c1a6c3 95175->95186 95177 c16b57 22 API calls 95176->95177 95179 c13ada 95177->95179 95182 c137a0 95179->95182 95183 c137ae 95182->95183 95184 c193b2 22 API calls 95183->95184 95185 c137c2 95184->95185 95185->95059 95187 c1a6d0 95186->95187 95188 c1a6dd 95186->95188 95187->95179 95189 c2fddb 22 API calls 95188->95189 95190 c1a6e7 95189->95190 95191 c2fe0b 22 API calls 95190->95191 95191->95187 95193 c133fe _wcslen 95192->95193 95194 c13411 95193->95194 95195 c5311d 95193->95195 95202 c1a587 95194->95202 95196 c2fddb 22 API calls 95195->95196 95199 c53127 95196->95199 95198 c1341e __fread_nolock 95198->95071 95200 c2fe0b 22 API calls 95199->95200 95201 c53157 __fread_nolock 95200->95201 95203 c1a59d 95202->95203 95206 c1a598 __fread_nolock 95202->95206 95204 c5f80f 95203->95204 95205 c2fe0b 22 API calls 95203->95205 95205->95206 95206->95198 95207 c12de3 95208 c12df0 __wsopen_s 95207->95208 95209 c12e09 95208->95209 95210 c52c2b ___scrt_fastfail 95208->95210 95211 c13aa2 23 API calls 95209->95211 95213 c52c47 GetOpenFileNameW 95210->95213 95212 c12e12 95211->95212 95223 c12da5 95212->95223 95215 c52c96 95213->95215 95216 c16b57 22 API calls 95215->95216 95218 c52cab 95216->95218 95218->95218 95220 c12e27 95241 c144a8 95220->95241 95224 c51f50 __wsopen_s 95223->95224 95225 c12db2 GetLongPathNameW 95224->95225 95226 c16b57 22 API calls 95225->95226 95227 c12dda 95226->95227 95228 c13598 95227->95228 95270 c1a961 95228->95270 95231 c13aa2 23 API calls 95232 c135b5 95231->95232 95233 c135c0 95232->95233 95236 c532eb 95232->95236 95275 c1515f 95233->95275 95238 c5330d 95236->95238 95287 c2ce60 41 API calls 95236->95287 95240 c135df 95240->95220 95288 c14ecb 95241->95288 95244 c53833 95310 c82cf9 95244->95310 95246 c14ecb 94 API calls 95248 c144e1 95246->95248 95247 c53848 95249 c5384c 95247->95249 95250 c53869 95247->95250 95248->95244 95251 c144e9 95248->95251 95337 c14f39 95249->95337 95253 c2fe0b 22 API calls 95250->95253 95254 c53854 95251->95254 95255 c144f5 95251->95255 95261 c538ae 95253->95261 95343 c7da5a 82 API calls 95254->95343 95336 c1940c 136 API calls 2 library calls 95255->95336 95258 c53862 95258->95250 95259 c12e31 95260 c14f39 68 API calls 95263 c53a5f 95260->95263 95261->95263 95267 c19cb3 22 API calls 95261->95267 95344 c7967e 22 API calls __fread_nolock 95261->95344 95345 c795ad 42 API calls _wcslen 95261->95345 95346 c80b5a 22 API calls 95261->95346 95347 c1a4a1 22 API calls __fread_nolock 95261->95347 95348 c13ff7 22 API calls 95261->95348 95263->95260 95349 c7989b 82 API calls __wsopen_s 95263->95349 95267->95261 95271 c2fe0b 22 API calls 95270->95271 95272 c1a976 95271->95272 95273 c2fddb 22 API calls 95272->95273 95274 c135aa 95273->95274 95274->95231 95276 c1516e 95275->95276 95280 c1518f __fread_nolock 95275->95280 95278 c2fe0b 22 API calls 95276->95278 95277 c2fddb 22 API calls 95279 c135cc 95277->95279 95278->95280 95281 c135f3 95279->95281 95280->95277 95282 c13605 95281->95282 95286 c13624 __fread_nolock 95281->95286 95285 c2fe0b 22 API calls 95282->95285 95283 c2fddb 22 API calls 95284 c1363b 95283->95284 95284->95240 95285->95286 95286->95283 95287->95236 95350 c14e90 LoadLibraryA 95288->95350 95293 c14ef6 LoadLibraryExW 95358 c14e59 LoadLibraryA 95293->95358 95294 c53ccf 95296 c14f39 68 API calls 95294->95296 95298 c53cd6 95296->95298 95300 c14e59 3 API calls 95298->95300 95302 c53cde 95300->95302 95301 c14f20 95301->95302 95303 c14f2c 95301->95303 95380 c150f5 95302->95380 95304 c14f39 68 API calls 95303->95304 95307 c144cd 95304->95307 95307->95244 95307->95246 95309 c53d05 95311 c82d15 95310->95311 95312 c1511f 64 API calls 95311->95312 95313 c82d29 95312->95313 95530 c82e66 95313->95530 95316 c150f5 40 API calls 95317 c82d56 95316->95317 95318 c150f5 40 API calls 95317->95318 95319 c82d66 95318->95319 95320 c150f5 40 API calls 95319->95320 95321 c82d81 95320->95321 95322 c150f5 40 API calls 95321->95322 95323 c82d9c 95322->95323 95324 c1511f 64 API calls 95323->95324 95325 c82db3 95324->95325 95326 c3ea0c ___std_exception_copy 21 API calls 95325->95326 95327 c82dba 95326->95327 95328 c3ea0c ___std_exception_copy 21 API calls 95327->95328 95329 c82dc4 95328->95329 95330 c150f5 40 API calls 95329->95330 95331 c82dd8 95330->95331 95332 c828fe 27 API calls 95331->95332 95334 c82dee 95332->95334 95333 c82d3f 95333->95247 95334->95333 95536 c822ce 79 API calls 95334->95536 95336->95259 95338 c14f43 95337->95338 95342 c14f4a 95337->95342 95537 c3e678 95338->95537 95340 c14f59 95340->95254 95341 c14f6a FreeLibrary 95341->95340 95342->95340 95342->95341 95343->95258 95344->95261 95345->95261 95346->95261 95347->95261 95348->95261 95349->95263 95351 c14ec6 95350->95351 95352 c14ea8 GetProcAddress 95350->95352 95355 c3e5eb 95351->95355 95353 c14eb8 95352->95353 95353->95351 95354 c14ebf FreeLibrary 95353->95354 95354->95351 95388 c3e52a 95355->95388 95357 c14eea 95357->95293 95357->95294 95359 c14e8d 95358->95359 95360 c14e6e GetProcAddress 95358->95360 95363 c14f80 95359->95363 95361 c14e7e 95360->95361 95361->95359 95362 c14e86 FreeLibrary 95361->95362 95362->95359 95364 c2fe0b 22 API calls 95363->95364 95365 c14f95 95364->95365 95456 c15722 95365->95456 95367 c14fa1 __fread_nolock 95368 c150a5 95367->95368 95369 c53d1d 95367->95369 95379 c14fdc 95367->95379 95459 c142a2 CreateStreamOnHGlobal 95368->95459 95470 c8304d 74 API calls 95369->95470 95372 c53d22 95374 c1511f 64 API calls 95372->95374 95373 c150f5 40 API calls 95373->95379 95375 c53d45 95374->95375 95376 c150f5 40 API calls 95375->95376 95378 c1506e messages 95376->95378 95378->95301 95379->95372 95379->95373 95379->95378 95465 c1511f 95379->95465 95381 c53d70 95380->95381 95382 c15107 95380->95382 95492 c3e8c4 95382->95492 95385 c828fe 95513 c8274e 95385->95513 95387 c82919 95387->95309 95390 c3e536 ___BuildCatchObject 95388->95390 95389 c3e544 95413 c3f2d9 20 API calls __dosmaperr 95389->95413 95390->95389 95392 c3e574 95390->95392 95395 c3e586 95392->95395 95396 c3e579 95392->95396 95393 c3e549 95414 c427ec 26 API calls pre_c_initialization 95393->95414 95405 c48061 95395->95405 95415 c3f2d9 20 API calls __dosmaperr 95396->95415 95399 c3e554 __wsopen_s 95399->95357 95400 c3e58f 95401 c3e5a2 95400->95401 95402 c3e595 95400->95402 95417 c3e5d4 LeaveCriticalSection __fread_nolock 95401->95417 95416 c3f2d9 20 API calls __dosmaperr 95402->95416 95406 c4806d ___BuildCatchObject 95405->95406 95418 c42f5e EnterCriticalSection 95406->95418 95408 c4807b 95419 c480fb 95408->95419 95412 c480ac __wsopen_s 95412->95400 95413->95393 95414->95399 95415->95399 95416->95399 95417->95399 95418->95408 95427 c4811e 95419->95427 95420 c48177 95437 c44c7d 95420->95437 95425 c48189 95428 c48088 95425->95428 95450 c43405 11 API calls 2 library calls 95425->95450 95427->95420 95427->95428 95435 c3918d EnterCriticalSection 95427->95435 95436 c391a1 LeaveCriticalSection 95427->95436 95432 c480b7 95428->95432 95429 c481a8 95451 c3918d EnterCriticalSection 95429->95451 95455 c42fa6 LeaveCriticalSection 95432->95455 95434 c480be 95434->95412 95435->95427 95436->95427 95438 c44c8a __dosmaperr 95437->95438 95439 c44cca 95438->95439 95440 c44cb5 RtlAllocateHeap 95438->95440 95452 c34ead 7 API calls 2 library calls 95438->95452 95453 c3f2d9 20 API calls __dosmaperr 95439->95453 95440->95438 95442 c44cc8 95440->95442 95444 c429c8 95442->95444 95445 c429fc __dosmaperr 95444->95445 95446 c429d3 RtlFreeHeap 95444->95446 95445->95425 95446->95445 95447 c429e8 95446->95447 95454 c3f2d9 20 API calls __dosmaperr 95447->95454 95449 c429ee GetLastError 95449->95445 95450->95429 95451->95428 95452->95438 95453->95442 95454->95449 95455->95434 95457 c2fddb 22 API calls 95456->95457 95458 c15734 95457->95458 95458->95367 95460 c142bc FindResourceExW 95459->95460 95464 c142d9 95459->95464 95461 c535ba LoadResource 95460->95461 95460->95464 95462 c535cf SizeofResource 95461->95462 95461->95464 95463 c535e3 LockResource 95462->95463 95462->95464 95463->95464 95464->95379 95466 c53d90 95465->95466 95467 c1512e 95465->95467 95471 c3ece3 95467->95471 95470->95372 95474 c3eaaa 95471->95474 95473 c1513c 95473->95379 95476 c3eab6 ___BuildCatchObject 95474->95476 95475 c3eac2 95487 c3f2d9 20 API calls __dosmaperr 95475->95487 95476->95475 95477 c3eae8 95476->95477 95489 c3918d EnterCriticalSection 95477->95489 95479 c3eac7 95488 c427ec 26 API calls pre_c_initialization 95479->95488 95482 c3eaf4 95490 c3ec0a 62 API calls 2 library calls 95482->95490 95484 c3eb08 95491 c3eb27 LeaveCriticalSection __fread_nolock 95484->95491 95486 c3ead2 __wsopen_s 95486->95473 95487->95479 95488->95486 95489->95482 95490->95484 95491->95486 95495 c3e8e1 95492->95495 95494 c15118 95494->95385 95496 c3e8ed ___BuildCatchObject 95495->95496 95497 c3e900 ___scrt_fastfail 95496->95497 95498 c3e92d 95496->95498 95499 c3e925 __wsopen_s 95496->95499 95508 c3f2d9 20 API calls __dosmaperr 95497->95508 95510 c3918d EnterCriticalSection 95498->95510 95499->95494 95502 c3e937 95511 c3e6f8 38 API calls 4 library calls 95502->95511 95503 c3e91a 95509 c427ec 26 API calls pre_c_initialization 95503->95509 95506 c3e94e 95512 c3e96c LeaveCriticalSection __fread_nolock 95506->95512 95508->95503 95509->95499 95510->95502 95511->95506 95512->95499 95516 c3e4e8 95513->95516 95515 c8275d 95515->95387 95519 c3e469 95516->95519 95518 c3e505 95518->95515 95520 c3e478 95519->95520 95521 c3e48c 95519->95521 95527 c3f2d9 20 API calls __dosmaperr 95520->95527 95526 c3e488 __alldvrm 95521->95526 95529 c4333f 11 API calls 2 library calls 95521->95529 95523 c3e47d 95528 c427ec 26 API calls pre_c_initialization 95523->95528 95526->95518 95527->95523 95528->95526 95529->95526 95532 c82e7a 95530->95532 95531 c150f5 40 API calls 95531->95532 95532->95531 95533 c828fe 27 API calls 95532->95533 95534 c82d3b 95532->95534 95535 c1511f 64 API calls 95532->95535 95533->95532 95534->95316 95534->95333 95535->95532 95536->95333 95538 c3e684 ___BuildCatchObject 95537->95538 95539 c3e695 95538->95539 95540 c3e6aa 95538->95540 95550 c3f2d9 20 API calls __dosmaperr 95539->95550 95549 c3e6a5 __wsopen_s 95540->95549 95552 c3918d EnterCriticalSection 95540->95552 95543 c3e69a 95551 c427ec 26 API calls pre_c_initialization 95543->95551 95544 c3e6c6 95553 c3e602 95544->95553 95547 c3e6d1 95569 c3e6ee LeaveCriticalSection __fread_nolock 95547->95569 95549->95342 95550->95543 95551->95549 95552->95544 95554 c3e624 95553->95554 95555 c3e60f 95553->95555 95561 c3e61f 95554->95561 95572 c3dc0b 95554->95572 95570 c3f2d9 20 API calls __dosmaperr 95555->95570 95558 c3e614 95571 c427ec 26 API calls pre_c_initialization 95558->95571 95561->95547 95565 c3e646 95589 c4862f 95565->95589 95568 c429c8 _free 20 API calls 95568->95561 95569->95549 95570->95558 95571->95561 95573 c3dc23 95572->95573 95574 c3dc1f 95572->95574 95573->95574 95575 c3d955 __fread_nolock 26 API calls 95573->95575 95578 c44d7a 95574->95578 95576 c3dc43 95575->95576 95604 c459be 62 API calls 4 library calls 95576->95604 95579 c3e640 95578->95579 95580 c44d90 95578->95580 95582 c3d955 95579->95582 95580->95579 95581 c429c8 _free 20 API calls 95580->95581 95581->95579 95583 c3d961 95582->95583 95584 c3d976 95582->95584 95605 c3f2d9 20 API calls __dosmaperr 95583->95605 95584->95565 95586 c3d966 95606 c427ec 26 API calls pre_c_initialization 95586->95606 95588 c3d971 95588->95565 95590 c48653 95589->95590 95591 c4863e 95589->95591 95593 c4868e 95590->95593 95597 c4867a 95590->95597 95607 c3f2c6 20 API calls __dosmaperr 95591->95607 95612 c3f2c6 20 API calls __dosmaperr 95593->95612 95594 c48643 95608 c3f2d9 20 API calls __dosmaperr 95594->95608 95609 c48607 95597->95609 95598 c48693 95613 c3f2d9 20 API calls __dosmaperr 95598->95613 95601 c3e64c 95601->95561 95601->95568 95602 c4869b 95614 c427ec 26 API calls pre_c_initialization 95602->95614 95604->95574 95605->95586 95606->95588 95607->95594 95608->95601 95615 c48585 95609->95615 95611 c4862b 95611->95601 95612->95598 95613->95602 95614->95601 95616 c48591 ___BuildCatchObject 95615->95616 95626 c45147 EnterCriticalSection 95616->95626 95618 c4859f 95619 c485c6 95618->95619 95620 c485d1 95618->95620 95627 c486ae 95619->95627 95642 c3f2d9 20 API calls __dosmaperr 95620->95642 95623 c485cc 95643 c485fb LeaveCriticalSection __wsopen_s 95623->95643 95625 c485ee __wsopen_s 95625->95611 95626->95618 95644 c453c4 95627->95644 95629 c486be 95630 c486c4 95629->95630 95632 c486f6 95629->95632 95633 c453c4 __wsopen_s 26 API calls 95629->95633 95657 c45333 21 API calls 2 library calls 95630->95657 95632->95630 95634 c453c4 __wsopen_s 26 API calls 95632->95634 95636 c486ed 95633->95636 95637 c48702 CloseHandle 95634->95637 95635 c4871c 95638 c4873e 95635->95638 95658 c3f2a3 20 API calls __dosmaperr 95635->95658 95639 c453c4 __wsopen_s 26 API calls 95636->95639 95637->95630 95640 c4870e GetLastError 95637->95640 95638->95623 95639->95632 95640->95630 95642->95623 95643->95625 95645 c453e6 95644->95645 95646 c453d1 95644->95646 95651 c4540b 95645->95651 95661 c3f2c6 20 API calls __dosmaperr 95645->95661 95659 c3f2c6 20 API calls __dosmaperr 95646->95659 95648 c453d6 95660 c3f2d9 20 API calls __dosmaperr 95648->95660 95651->95629 95652 c45416 95662 c3f2d9 20 API calls __dosmaperr 95652->95662 95653 c453de 95653->95629 95655 c4541e 95663 c427ec 26 API calls pre_c_initialization 95655->95663 95657->95635 95658->95638 95659->95648 95660->95653 95661->95652 95662->95655 95663->95653 95664 c45107 95670 c45000 95664->95670 95666 c45117 95677 c4513e LeaveCriticalSection _abort 95666->95677 95668 c450f6 95668->95664 95668->95666 95669 c450d7 __wsopen_s 95671 c44c7d __dosmaperr 20 API calls 95670->95671 95672 c45012 95671->95672 95676 c4501f 95672->95676 95678 c43405 11 API calls 2 library calls 95672->95678 95673 c429c8 _free 20 API calls 95675 c45071 95673->95675 95675->95668 95676->95673 95677->95669 95678->95672 95679 c11044 95684 c110f3 95679->95684 95681 c1104a 95720 c300a3 29 API calls __onexit 95681->95720 95683 c11054 95721 c11398 95684->95721 95688 c1116a 95689 c1a961 22 API calls 95688->95689 95690 c11174 95689->95690 95691 c1a961 22 API calls 95690->95691 95692 c1117e 95691->95692 95693 c1a961 22 API calls 95692->95693 95694 c11188 95693->95694 95695 c1a961 22 API calls 95694->95695 95696 c111c6 95695->95696 95697 c1a961 22 API calls 95696->95697 95698 c11292 95697->95698 95731 c1171c 95698->95731 95702 c112c4 95703 c1a961 22 API calls 95702->95703 95704 c112ce 95703->95704 95752 c21940 95704->95752 95706 c112f9 95762 c11aab 95706->95762 95708 c11315 95709 c11325 GetStdHandle 95708->95709 95710 c52485 95709->95710 95711 c1137a 95709->95711 95710->95711 95712 c5248e 95710->95712 95714 c11387 OleInitialize 95711->95714 95713 c2fddb 22 API calls 95712->95713 95715 c52495 95713->95715 95714->95681 95769 c8011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 95715->95769 95717 c5249e 95770 c80944 CreateThread 95717->95770 95719 c524aa CloseHandle 95719->95711 95720->95683 95771 c113f1 95721->95771 95724 c113f1 22 API calls 95725 c113d0 95724->95725 95726 c1a961 22 API calls 95725->95726 95727 c113dc 95726->95727 95728 c16b57 22 API calls 95727->95728 95729 c11129 95728->95729 95730 c11bc3 6 API calls 95729->95730 95730->95688 95732 c1a961 22 API calls 95731->95732 95733 c1172c 95732->95733 95734 c1a961 22 API calls 95733->95734 95735 c11734 95734->95735 95736 c1a961 22 API calls 95735->95736 95737 c1174f 95736->95737 95738 c2fddb 22 API calls 95737->95738 95739 c1129c 95738->95739 95740 c11b4a 95739->95740 95741 c11b58 95740->95741 95742 c1a961 22 API calls 95741->95742 95743 c11b63 95742->95743 95744 c1a961 22 API calls 95743->95744 95745 c11b6e 95744->95745 95746 c1a961 22 API calls 95745->95746 95747 c11b79 95746->95747 95748 c1a961 22 API calls 95747->95748 95749 c11b84 95748->95749 95750 c2fddb 22 API calls 95749->95750 95751 c11b96 RegisterWindowMessageW 95750->95751 95751->95702 95753 c21981 95752->95753 95761 c2195d 95752->95761 95778 c30242 5 API calls __Init_thread_wait 95753->95778 95754 c2196e 95754->95706 95757 c2198b 95757->95761 95779 c301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95757->95779 95758 c28727 95758->95754 95781 c301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95758->95781 95761->95754 95780 c30242 5 API calls __Init_thread_wait 95761->95780 95763 c5272d 95762->95763 95764 c11abb 95762->95764 95782 c83209 23 API calls 95763->95782 95766 c2fddb 22 API calls 95764->95766 95768 c11ac3 95766->95768 95767 c52738 95768->95708 95769->95717 95770->95719 95783 c8092a 28 API calls 95770->95783 95772 c1a961 22 API calls 95771->95772 95773 c113fc 95772->95773 95774 c1a961 22 API calls 95773->95774 95775 c11404 95774->95775 95776 c1a961 22 API calls 95775->95776 95777 c113c6 95776->95777 95777->95724 95778->95757 95779->95761 95780->95758 95781->95754 95782->95767 95784 c62a00 95800 c1d7b0 messages 95784->95800 95785 c1db11 PeekMessageW 95785->95800 95786 c1d807 GetInputState 95786->95785 95786->95800 95788 c61cbe TranslateAcceleratorW 95788->95800 95789 c1db8f PeekMessageW 95789->95800 95790 c1da04 timeGetTime 95790->95800 95791 c1db73 TranslateMessage DispatchMessageW 95791->95789 95792 c1dbaf Sleep 95792->95800 95793 c62b74 Sleep 95806 c62a51 95793->95806 95796 c61dda timeGetTime 95943 c2e300 23 API calls 95796->95943 95799 c62c0b GetExitCodeProcess 95804 c62c37 CloseHandle 95799->95804 95805 c62c21 WaitForSingleObject 95799->95805 95800->95785 95800->95786 95800->95788 95800->95789 95800->95790 95800->95791 95800->95792 95800->95793 95800->95796 95802 c1d9d5 95800->95802 95800->95806 95816 c1dd50 95800->95816 95823 c21310 95800->95823 95878 c1bf40 95800->95878 95936 c2edf6 95800->95936 95941 c1dfd0 348 API calls 3 library calls 95800->95941 95942 c2e551 timeGetTime 95800->95942 95944 c83a2a 23 API calls 95800->95944 95945 c1ec40 95800->95945 95969 c8359c 82 API calls __wsopen_s 95800->95969 95801 ca29bf GetForegroundWindow 95801->95806 95804->95806 95805->95800 95805->95804 95806->95799 95806->95800 95806->95801 95806->95802 95807 c62ca9 Sleep 95806->95807 95970 c95658 23 API calls 95806->95970 95971 c7e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 95806->95971 95972 c2e551 timeGetTime 95806->95972 95973 c7d4dc CreateToolhelp32Snapshot Process32FirstW 95806->95973 95807->95800 95817 c1dd6f 95816->95817 95819 c1dd83 95816->95819 95983 c1d260 95817->95983 96015 c8359c 82 API calls __wsopen_s 95819->96015 95820 c1dd7a 95820->95800 95822 c62f75 95822->95822 95824 c217b0 95823->95824 95825 c21376 95823->95825 96054 c30242 5 API calls __Init_thread_wait 95824->96054 95826 c21390 95825->95826 95827 c66331 95825->95827 95829 c21940 9 API calls 95826->95829 95830 c6633d 95827->95830 96068 c9709c 348 API calls 95827->96068 95833 c213a0 95829->95833 95830->95800 95832 c217ba 95834 c217fb 95832->95834 95836 c19cb3 22 API calls 95832->95836 95835 c21940 9 API calls 95833->95835 95838 c66346 95834->95838 95840 c2182c 95834->95840 95837 c213b6 95835->95837 95844 c217d4 95836->95844 95837->95834 95839 c213ec 95837->95839 96069 c8359c 82 API calls __wsopen_s 95838->96069 95839->95838 95863 c21408 __fread_nolock 95839->95863 96056 c1aceb 95840->96056 95843 c21839 96066 c2d217 348 API calls 95843->96066 96055 c301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95844->96055 95847 c6636e 96070 c8359c 82 API calls __wsopen_s 95847->96070 95849 c2152f 95850 c663d1 95849->95850 95851 c2153c 95849->95851 96072 c95745 54 API calls _wcslen 95850->96072 95852 c21940 9 API calls 95851->95852 95854 c21549 95852->95854 95859 c21940 9 API calls 95854->95859 95868 c215c7 messages 95854->95868 95855 c2fddb 22 API calls 95855->95863 95856 c2fe0b 22 API calls 95856->95863 95857 c21872 96067 c2faeb 23 API calls 95857->96067 95867 c21563 95859->95867 95860 c2171d 95860->95800 95862 c1ec40 348 API calls 95862->95863 95863->95843 95863->95847 95863->95849 95863->95855 95863->95856 95863->95862 95865 c663b2 95863->95865 95863->95868 95864 c21940 9 API calls 95864->95868 96071 c8359c 82 API calls __wsopen_s 95865->96071 95867->95868 96073 c1a8c7 22 API calls __fread_nolock 95867->96073 95868->95857 95868->95864 95870 c2167b messages 95868->95870 96025 c85c5a 95868->96025 96030 c2f645 95868->96030 96037 c9abf7 95868->96037 96042 c9a2ea 95868->96042 96047 ca1591 95868->96047 96050 c9ab67 95868->96050 96074 c8359c 82 API calls __wsopen_s 95868->96074 95870->95860 96053 c2ce17 22 API calls messages 95870->96053 96248 c1adf0 95878->96248 95880 c1bf9d 95881 c604b6 95880->95881 95882 c1bfa9 95880->95882 96266 c8359c 82 API calls __wsopen_s 95881->96266 95884 c604c6 95882->95884 95885 c1c01e 95882->95885 96267 c8359c 82 API calls __wsopen_s 95884->96267 96253 c1ac91 95885->96253 95889 c77120 22 API calls 95922 c1c039 __fread_nolock messages 95889->95922 95890 c1c7da 95893 c2fe0b 22 API calls 95890->95893 95898 c1c808 __fread_nolock 95893->95898 95895 c604f5 95899 c6055a 95895->95899 96268 c2d217 348 API calls 95895->96268 95901 c2fe0b 22 API calls 95898->95901 95935 c1c603 95899->95935 96269 c8359c 82 API calls __wsopen_s 95899->96269 95900 c1ec40 348 API calls 95900->95922 95925 c1c350 __fread_nolock messages 95901->95925 95902 c1af8a 22 API calls 95902->95922 95903 c6091a 96278 c83209 23 API calls 95903->96278 95904 c2fddb 22 API calls 95904->95922 95907 c608a5 95908 c1ec40 348 API calls 95907->95908 95909 c608cf 95908->95909 95909->95935 96276 c1a81b 41 API calls 95909->96276 95911 c60591 96270 c8359c 82 API calls __wsopen_s 95911->96270 95915 c608f6 96277 c8359c 82 API calls __wsopen_s 95915->96277 95917 c1bbe0 40 API calls 95917->95922 95918 c1c3ac 95918->95800 95919 c1aceb 23 API calls 95919->95922 95920 c1c237 95921 c1c253 95920->95921 96279 c1a8c7 22 API calls __fread_nolock 95920->96279 95926 c60976 95921->95926 95929 c1c297 messages 95921->95929 95922->95889 95922->95890 95922->95895 95922->95898 95922->95899 95922->95900 95922->95902 95922->95903 95922->95904 95922->95907 95922->95911 95922->95915 95922->95917 95922->95919 95922->95920 95924 c2fe0b 22 API calls 95922->95924 95931 c609bf 95922->95931 95922->95935 96257 c1ad81 95922->96257 96271 c77099 22 API calls __fread_nolock 95922->96271 96272 c95745 54 API calls _wcslen 95922->96272 96273 c2aa42 22 API calls messages 95922->96273 96274 c7f05c 40 API calls 95922->96274 96275 c1a993 41 API calls 95922->96275 95924->95922 95925->95918 96265 c2ce17 22 API calls messages 95925->96265 95928 c1aceb 23 API calls 95926->95928 95928->95931 95930 c1aceb 23 API calls 95929->95930 95929->95931 95932 c1c335 95930->95932 95931->95935 96280 c8359c 82 API calls __wsopen_s 95931->96280 95932->95931 95933 c1c342 95932->95933 96264 c1a704 22 API calls messages 95933->96264 95935->95800 95937 c2ee09 95936->95937 95938 c2ee12 95936->95938 95937->95800 95938->95937 95939 c2ee36 IsDialogMessageW 95938->95939 95940 c6efaf GetClassLongW 95938->95940 95939->95937 95939->95938 95940->95938 95940->95939 95941->95800 95942->95800 95943->95800 95944->95800 95965 c1ec76 messages 95945->95965 95946 c30242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95946->95965 95947 c301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95947->95965 95948 c1fef7 95962 c1ed9d messages 95948->95962 96293 c1a8c7 22 API calls __fread_nolock 95948->96293 95950 c2fddb 22 API calls 95950->95965 95952 c64b0b 96295 c8359c 82 API calls __wsopen_s 95952->96295 95953 c1a8c7 22 API calls 95953->95965 95954 c64600 95954->95962 96292 c1a8c7 22 API calls __fread_nolock 95954->96292 95960 c1fbe3 95960->95962 95964 c64bdc 95960->95964 95968 c1f3ae messages 95960->95968 95961 c1a961 22 API calls 95961->95965 95962->95800 95963 c300a3 29 API calls pre_c_initialization 95963->95965 96296 c8359c 82 API calls __wsopen_s 95964->96296 95965->95946 95965->95947 95965->95948 95965->95950 95965->95952 95965->95953 95965->95954 95965->95960 95965->95961 95965->95962 95965->95963 95967 c64beb 95965->95967 95965->95968 96290 c201e0 348 API calls 2 library calls 95965->96290 96291 c206a0 41 API calls messages 95965->96291 96297 c8359c 82 API calls __wsopen_s 95967->96297 95968->95962 96294 c8359c 82 API calls __wsopen_s 95968->96294 95969->95800 95970->95806 95971->95806 95972->95806 96298 c7def7 95973->96298 95975 c7d5db CloseHandle 95975->95806 95976 c7d529 Process32NextW 95976->95975 95978 c7d522 95976->95978 95977 c1a961 22 API calls 95977->95978 95978->95975 95978->95976 95978->95977 95979 c19cb3 22 API calls 95978->95979 96304 c1525f 22 API calls 95978->96304 96305 c16350 22 API calls 95978->96305 96306 c2ce60 41 API calls 95978->96306 95979->95978 95984 c1ec40 348 API calls 95983->95984 96000 c1d29d 95984->96000 95985 c61bc4 96024 c8359c 82 API calls __wsopen_s 95985->96024 95987 c1d3c3 95990 c1d6d5 95987->95990 95991 c1d3ce 95987->95991 95988 c1d30b messages 95988->95820 95989 c1d5ff 95992 c61bb5 95989->95992 95993 c1d614 95989->95993 95990->95988 95998 c2fe0b 22 API calls 95990->95998 95995 c2fddb 22 API calls 95991->95995 96023 c95705 23 API calls 95992->96023 95997 c2fddb 22 API calls 95993->95997 95994 c1d4b8 95999 c2fe0b 22 API calls 95994->95999 96003 c1d3d5 __fread_nolock 95995->96003 96007 c1d46a 95997->96007 95998->96003 96010 c1d429 __fread_nolock messages 95999->96010 96000->95985 96000->95987 96000->95988 96000->95990 96000->95994 96004 c2fddb 22 API calls 96000->96004 96000->96010 96001 c2fddb 22 API calls 96002 c1d3f6 96001->96002 96002->96010 96016 c1bec0 348 API calls 96002->96016 96003->96001 96003->96002 96004->96000 96006 c61ba4 96022 c8359c 82 API calls __wsopen_s 96006->96022 96007->95820 96010->95989 96010->96006 96010->96007 96011 c61b7f 96010->96011 96013 c61b5d 96010->96013 96017 c11f6f 96010->96017 96021 c8359c 82 API calls __wsopen_s 96011->96021 96020 c8359c 82 API calls __wsopen_s 96013->96020 96015->95822 96016->96010 96018 c1ec40 348 API calls 96017->96018 96019 c11f98 96018->96019 96019->96010 96020->96007 96021->96007 96022->96007 96023->95985 96024->95988 96075 c17510 96025->96075 96029 c85c77 96029->95868 96107 c1b567 96030->96107 96032 c2f659 96033 c2f661 timeGetTime 96032->96033 96034 c6f2dc Sleep 96032->96034 96035 c1b567 39 API calls 96033->96035 96036 c2f677 96035->96036 96036->95868 96113 c9aff9 96037->96113 96039 c9ac54 96039->95868 96040 c9ac0c 96040->96039 96041 c1aceb 23 API calls 96040->96041 96041->96039 96043 c17510 53 API calls 96042->96043 96044 c9a306 96043->96044 96045 c7d4dc 47 API calls 96044->96045 96046 c9a315 96045->96046 96046->95868 96235 ca2ad8 96047->96235 96049 ca159f 96049->95868 96051 c9aff9 217 API calls 96050->96051 96052 c9ab79 96051->96052 96052->95868 96053->95870 96054->95832 96055->95834 96057 c1acf9 96056->96057 96065 c1ad2a messages 96056->96065 96058 c1ad55 96057->96058 96060 c1ad01 messages 96057->96060 96058->96065 96246 c1a8c7 22 API calls __fread_nolock 96058->96246 96061 c1ad21 96060->96061 96062 c5fa48 96060->96062 96060->96065 96063 c5fa3a VariantClear 96061->96063 96061->96065 96062->96065 96247 c2ce17 22 API calls messages 96062->96247 96063->96065 96065->95843 96066->95857 96067->95857 96068->95830 96069->95868 96070->95868 96071->95868 96072->95867 96073->95868 96074->95868 96076 c17522 96075->96076 96077 c17525 96075->96077 96098 c7dbbe lstrlenW 96076->96098 96078 c1755b 96077->96078 96079 c1752d 96077->96079 96080 c550f6 96078->96080 96084 c1756d 96078->96084 96090 c5500f 96078->96090 96103 c351c6 26 API calls 96079->96103 96106 c35183 26 API calls 96080->96106 96082 c1753d 96087 c2fddb 22 API calls 96082->96087 96104 c2fb21 51 API calls 96084->96104 96085 c5510e 96085->96085 96089 c17547 96087->96089 96091 c19cb3 22 API calls 96089->96091 96092 c2fe0b 22 API calls 96090->96092 96093 c55088 96090->96093 96091->96076 96094 c55058 96092->96094 96105 c2fb21 51 API calls 96093->96105 96095 c2fddb 22 API calls 96094->96095 96096 c5507f 96095->96096 96097 c19cb3 22 API calls 96096->96097 96097->96093 96099 c7dbdc GetFileAttributesW 96098->96099 96100 c7dc06 96098->96100 96099->96100 96101 c7dbe8 FindFirstFileW 96099->96101 96100->96029 96101->96100 96102 c7dbf9 FindClose 96101->96102 96102->96100 96103->96082 96104->96082 96105->96080 96106->96085 96108 c1b578 96107->96108 96109 c1b57f 96107->96109 96108->96109 96112 c362d1 39 API calls 96108->96112 96109->96032 96111 c1b5c2 96111->96032 96112->96111 96114 c9b01d ___scrt_fastfail 96113->96114 96115 c9b058 96114->96115 96116 c9b094 96114->96116 96117 c1b567 39 API calls 96115->96117 96120 c1b567 39 API calls 96116->96120 96121 c9b08b 96116->96121 96118 c9b063 96117->96118 96118->96121 96124 c1b567 39 API calls 96118->96124 96119 c9b0ed 96122 c17510 53 API calls 96119->96122 96123 c9b0a5 96120->96123 96121->96119 96125 c1b567 39 API calls 96121->96125 96126 c9b10b 96122->96126 96127 c1b567 39 API calls 96123->96127 96128 c9b078 96124->96128 96125->96119 96204 c17620 96126->96204 96127->96121 96131 c1b567 39 API calls 96128->96131 96130 c9b115 96132 c9b1d8 96130->96132 96133 c9b11f 96130->96133 96131->96121 96135 c9b20a GetCurrentDirectoryW 96132->96135 96138 c17510 53 API calls 96132->96138 96134 c17510 53 API calls 96133->96134 96136 c9b130 96134->96136 96137 c2fe0b 22 API calls 96135->96137 96139 c17620 22 API calls 96136->96139 96140 c9b22f GetCurrentDirectoryW 96137->96140 96141 c9b1ef 96138->96141 96142 c9b13a 96139->96142 96143 c9b23c 96140->96143 96144 c17620 22 API calls 96141->96144 96145 c17510 53 API calls 96142->96145 96148 c9b275 96143->96148 96211 c19c6e 22 API calls 96143->96211 96146 c9b1f9 _wcslen 96144->96146 96147 c9b14b 96145->96147 96146->96135 96146->96148 96149 c17620 22 API calls 96147->96149 96153 c9b28b 96148->96153 96154 c9b287 96148->96154 96151 c9b155 96149->96151 96155 c17510 53 API calls 96151->96155 96152 c9b255 96212 c19c6e 22 API calls 96152->96212 96214 c807c0 10 API calls 96153->96214 96161 c9b2f8 96154->96161 96162 c9b39a CreateProcessW 96154->96162 96158 c9b166 96155->96158 96163 c17620 22 API calls 96158->96163 96159 c9b265 96213 c19c6e 22 API calls 96159->96213 96160 c9b294 96215 c806e6 10 API calls 96160->96215 96217 c711c8 39 API calls 96161->96217 96179 c9b32f _wcslen 96162->96179 96167 c9b170 96163->96167 96170 c9b1a6 GetSystemDirectoryW 96167->96170 96175 c17510 53 API calls 96167->96175 96168 c9b2aa 96216 c805a7 8 API calls 96168->96216 96169 c9b2fd 96173 c9b32a 96169->96173 96174 c9b323 96169->96174 96172 c2fe0b 22 API calls 96170->96172 96178 c9b1cb GetSystemDirectoryW 96172->96178 96219 c714ce 6 API calls 96173->96219 96218 c71201 128 API calls 2 library calls 96174->96218 96176 c9b187 96175->96176 96181 c17620 22 API calls 96176->96181 96178->96143 96185 c9b42f CloseHandle 96179->96185 96186 c9b3d6 GetLastError 96179->96186 96184 c9b191 _wcslen 96181->96184 96182 c9b2d0 96182->96154 96183 c9b328 96183->96179 96184->96143 96184->96170 96187 c9b43f 96185->96187 96195 c9b49a 96185->96195 96194 c9b41a 96186->96194 96188 c9b451 96187->96188 96189 c9b446 CloseHandle 96187->96189 96192 c9b458 CloseHandle 96188->96192 96193 c9b463 96188->96193 96189->96188 96191 c9b4a6 96191->96194 96192->96193 96196 c9b46a CloseHandle 96193->96196 96197 c9b475 96193->96197 96208 c80175 96194->96208 96195->96191 96200 c9b4d2 CloseHandle 96195->96200 96196->96197 96220 c809d9 34 API calls 96197->96220 96200->96194 96202 c9b486 96221 c9b536 25 API calls 96202->96221 96205 c1762a _wcslen 96204->96205 96206 c2fe0b 22 API calls 96205->96206 96207 c1763f 96206->96207 96207->96130 96222 c8030f 96208->96222 96211->96152 96212->96159 96213->96148 96214->96160 96215->96168 96216->96182 96217->96169 96218->96183 96219->96179 96220->96202 96221->96195 96223 c80329 96222->96223 96224 c80321 CloseHandle 96222->96224 96225 c8032e CloseHandle 96223->96225 96226 c80336 96223->96226 96224->96223 96225->96226 96227 c8033b CloseHandle 96226->96227 96228 c80343 96226->96228 96227->96228 96229 c80348 CloseHandle 96228->96229 96230 c80350 96228->96230 96229->96230 96231 c8035d 96230->96231 96232 c80355 CloseHandle 96230->96232 96233 c8017d 96231->96233 96234 c80362 CloseHandle 96231->96234 96232->96231 96233->96040 96234->96233 96236 c1aceb 23 API calls 96235->96236 96237 ca2af3 96236->96237 96238 ca2aff 96237->96238 96239 ca2b1d 96237->96239 96240 c17510 53 API calls 96238->96240 96241 c16b57 22 API calls 96239->96241 96242 ca2b0c 96240->96242 96243 ca2b1b 96241->96243 96242->96243 96245 c1a8c7 22 API calls __fread_nolock 96242->96245 96243->96049 96245->96243 96246->96065 96247->96065 96249 c1ae01 96248->96249 96252 c1ae1c messages 96248->96252 96250 c1aec9 22 API calls 96249->96250 96251 c1ae09 CharUpperBuffW 96250->96251 96251->96252 96252->95880 96254 c1acae 96253->96254 96255 c1acd1 96254->96255 96281 c8359c 82 API calls __wsopen_s 96254->96281 96255->95922 96258 c1ad92 96257->96258 96259 c5fadb 96257->96259 96260 c2fddb 22 API calls 96258->96260 96261 c1ad99 96260->96261 96282 c1adcd 96261->96282 96264->95925 96265->95925 96266->95884 96267->95935 96268->95899 96269->95935 96270->95935 96271->95922 96272->95922 96273->95922 96274->95922 96275->95922 96276->95915 96277->95935 96278->95920 96279->95921 96280->95935 96281->96255 96286 c1addd 96282->96286 96283 c1adb6 96283->95922 96284 c2fddb 22 API calls 96284->96286 96285 c1a961 22 API calls 96285->96286 96286->96283 96286->96284 96286->96285 96287 c1adcd 22 API calls 96286->96287 96289 c1a8c7 22 API calls __fread_nolock 96286->96289 96287->96286 96289->96286 96290->95965 96291->95965 96292->95962 96293->95962 96294->95962 96295->95962 96296->95967 96297->95962 96299 c7df02 96298->96299 96300 c7df19 96299->96300 96303 c7df1f 96299->96303 96307 c363b2 GetStringTypeW _strftime 96299->96307 96308 c362fb 39 API calls 96300->96308 96303->95978 96304->95978 96305->95978 96306->95978 96307->96299 96308->96303 96309 c48402 96314 c481be 96309->96314 96312 c4842a 96315 c481ef try_get_first_available_module 96314->96315 96322 c48338 96315->96322 96329 c38e0b 40 API calls 2 library calls 96315->96329 96317 c483ee 96333 c427ec 26 API calls pre_c_initialization 96317->96333 96319 c48343 96319->96312 96326 c50984 96319->96326 96321 c4838c 96321->96322 96330 c38e0b 40 API calls 2 library calls 96321->96330 96322->96319 96332 c3f2d9 20 API calls __dosmaperr 96322->96332 96324 c483ab 96324->96322 96331 c38e0b 40 API calls 2 library calls 96324->96331 96334 c50081 96326->96334 96328 c5099f 96328->96312 96329->96321 96330->96324 96331->96322 96332->96317 96333->96319 96335 c5008d ___BuildCatchObject 96334->96335 96336 c5009b 96335->96336 96338 c500d4 96335->96338 96391 c3f2d9 20 API calls __dosmaperr 96336->96391 96345 c5065b 96338->96345 96339 c500a0 96392 c427ec 26 API calls pre_c_initialization 96339->96392 96344 c500aa __wsopen_s 96344->96328 96346 c50678 96345->96346 96347 c506a6 96346->96347 96348 c5068d 96346->96348 96394 c45221 96347->96394 96408 c3f2c6 20 API calls __dosmaperr 96348->96408 96351 c506ab 96352 c506b4 96351->96352 96353 c506cb 96351->96353 96410 c3f2c6 20 API calls __dosmaperr 96352->96410 96407 c5039a CreateFileW 96353->96407 96357 c506b9 96411 c3f2d9 20 API calls __dosmaperr 96357->96411 96359 c50781 GetFileType 96363 c507d3 96359->96363 96364 c5078c GetLastError 96359->96364 96360 c50692 96409 c3f2d9 20 API calls __dosmaperr 96360->96409 96361 c50756 GetLastError 96413 c3f2a3 20 API calls __dosmaperr 96361->96413 96362 c50704 96362->96359 96362->96361 96412 c5039a CreateFileW 96362->96412 96416 c4516a 21 API calls 2 library calls 96363->96416 96414 c3f2a3 20 API calls __dosmaperr 96364->96414 96367 c5079a CloseHandle 96367->96360 96369 c507c3 96367->96369 96415 c3f2d9 20 API calls __dosmaperr 96369->96415 96371 c50749 96371->96359 96371->96361 96373 c507f4 96375 c50840 96373->96375 96417 c505ab 72 API calls 3 library calls 96373->96417 96374 c507c8 96374->96360 96379 c5086d 96375->96379 96418 c5014d 72 API calls 4 library calls 96375->96418 96378 c50866 96378->96379 96380 c5087e 96378->96380 96381 c486ae __wsopen_s 29 API calls 96379->96381 96382 c500f8 96380->96382 96383 c508fc CloseHandle 96380->96383 96381->96382 96393 c50121 LeaveCriticalSection __wsopen_s 96382->96393 96419 c5039a CreateFileW 96383->96419 96385 c50927 96386 c50931 GetLastError 96385->96386 96387 c5095d 96385->96387 96420 c3f2a3 20 API calls __dosmaperr 96386->96420 96387->96382 96389 c5093d 96421 c45333 21 API calls 2 library calls 96389->96421 96391->96339 96392->96344 96393->96344 96395 c4522d ___BuildCatchObject 96394->96395 96422 c42f5e EnterCriticalSection 96395->96422 96398 c45234 96399 c45259 96398->96399 96403 c452c7 EnterCriticalSection 96398->96403 96406 c4527b 96398->96406 96400 c45000 __wsopen_s 21 API calls 96399->96400 96402 c4525e 96400->96402 96401 c452a4 __wsopen_s 96401->96351 96402->96406 96426 c45147 EnterCriticalSection 96402->96426 96405 c452d4 LeaveCriticalSection 96403->96405 96403->96406 96405->96398 96423 c4532a 96406->96423 96407->96362 96408->96360 96409->96382 96410->96357 96411->96360 96412->96371 96413->96360 96414->96367 96415->96374 96416->96373 96417->96375 96418->96378 96419->96385 96420->96389 96421->96387 96422->96398 96427 c42fa6 LeaveCriticalSection 96423->96427 96425 c45331 96425->96401 96426->96406 96427->96425 96428 c52402 96431 c11410 96428->96431 96432 c524b8 DestroyWindow 96431->96432 96433 c1144f mciSendStringW 96431->96433 96445 c524c4 96432->96445 96434 c116c6 96433->96434 96435 c1146b 96433->96435 96434->96435 96437 c116d5 UnregisterHotKey 96434->96437 96436 c11479 96435->96436 96435->96445 96464 c1182e 96436->96464 96437->96434 96439 c524e2 FindClose 96439->96445 96440 c524d8 96440->96445 96470 c16246 CloseHandle 96440->96470 96442 c52509 96446 c5252d 96442->96446 96447 c5251c FreeLibrary 96442->96447 96444 c1148e 96444->96446 96454 c1149c 96444->96454 96445->96439 96445->96440 96445->96442 96448 c52541 VirtualFree 96446->96448 96455 c11509 96446->96455 96447->96442 96448->96446 96449 c114f8 CoUninitialize 96449->96455 96450 c11514 96452 c11524 96450->96452 96451 c52589 96457 c52598 messages 96451->96457 96471 c832eb 6 API calls messages 96451->96471 96468 c11944 VirtualFreeEx CloseHandle 96452->96468 96454->96449 96455->96450 96455->96451 96460 c52627 96457->96460 96472 c764d4 22 API calls messages 96457->96472 96459 c1153a 96459->96457 96461 c1161f 96459->96461 96460->96460 96461->96460 96469 c11876 CloseHandle InternetCloseHandle InternetCloseHandle WaitForSingleObject 96461->96469 96463 c116c1 96465 c1183b 96464->96465 96466 c11480 96465->96466 96473 c7702a 22 API calls 96465->96473 96466->96442 96466->96444 96468->96459 96469->96463 96470->96440 96471->96451 96472->96457 96473->96465 96474 c11cad SystemParametersInfoW 96475 c11033 96480 c14c91 96475->96480 96479 c11042 96481 c1a961 22 API calls 96480->96481 96482 c14cff 96481->96482 96488 c13af0 96482->96488 96485 c14d9c 96486 c11038 96485->96486 96491 c151f7 22 API calls __fread_nolock 96485->96491 96487 c300a3 29 API calls __onexit 96486->96487 96487->96479 96492 c13b1c 96488->96492 96491->96485 96493 c13b0f 96492->96493 96494 c13b29 96492->96494 96493->96485 96494->96493 96495 c13b30 RegOpenKeyExW 96494->96495 96495->96493 96496 c13b4a RegQueryValueExW 96495->96496 96497 c13b80 RegCloseKey 96496->96497 96498 c13b6b 96496->96498 96497->96493 96498->96497 96499 c63f75 96510 c2ceb1 96499->96510 96501 c63f8b 96503 c64006 96501->96503 96519 c2e300 23 API calls 96501->96519 96504 c1bf40 348 API calls 96503->96504 96506 c64052 96504->96506 96508 c64a88 96506->96508 96521 c8359c 82 API calls __wsopen_s 96506->96521 96507 c63fe6 96507->96506 96520 c81abf 22 API calls 96507->96520 96511 c2ced2 96510->96511 96512 c2cebf 96510->96512 96514 c2ced7 96511->96514 96515 c2cf05 96511->96515 96513 c1aceb 23 API calls 96512->96513 96518 c2cec9 96513->96518 96516 c2fddb 22 API calls 96514->96516 96517 c1aceb 23 API calls 96515->96517 96516->96518 96517->96518 96518->96501 96519->96507 96520->96503 96521->96508 96522 c12e37 96523 c1a961 22 API calls 96522->96523 96524 c12e4d 96523->96524 96601 c14ae3 96524->96601 96526 c12e6b 96527 c13a5a 24 API calls 96526->96527 96528 c12e7f 96527->96528 96529 c19cb3 22 API calls 96528->96529 96530 c12e8c 96529->96530 96531 c14ecb 94 API calls 96530->96531 96532 c12ea5 96531->96532 96533 c52cb0 96532->96533 96534 c12ead 96532->96534 96535 c82cf9 80 API calls 96533->96535 96615 c1a8c7 22 API calls __fread_nolock 96534->96615 96536 c52cc3 96535->96536 96538 c52ccf 96536->96538 96540 c14f39 68 API calls 96536->96540 96542 c14f39 68 API calls 96538->96542 96539 c12ec3 96616 c16f88 22 API calls 96539->96616 96540->96538 96544 c52ce5 96542->96544 96543 c12ecf 96545 c19cb3 22 API calls 96543->96545 96633 c13084 22 API calls 96544->96633 96546 c12edc 96545->96546 96617 c1a81b 41 API calls 96546->96617 96549 c12eec 96551 c19cb3 22 API calls 96549->96551 96550 c52d02 96634 c13084 22 API calls 96550->96634 96553 c12f12 96551->96553 96618 c1a81b 41 API calls 96553->96618 96554 c52d1e 96556 c13a5a 24 API calls 96554->96556 96558 c52d44 96556->96558 96557 c12f21 96561 c1a961 22 API calls 96557->96561 96635 c13084 22 API calls 96558->96635 96560 c52d50 96636 c1a8c7 22 API calls __fread_nolock 96560->96636 96563 c12f3f 96561->96563 96619 c13084 22 API calls 96563->96619 96564 c52d5e 96637 c13084 22 API calls 96564->96637 96567 c12f4b 96620 c34a28 40 API calls 3 library calls 96567->96620 96568 c52d6d 96638 c1a8c7 22 API calls __fread_nolock 96568->96638 96570 c12f59 96570->96544 96571 c12f63 96570->96571 96621 c34a28 40 API calls 3 library calls 96571->96621 96574 c52d83 96639 c13084 22 API calls 96574->96639 96575 c12f6e 96575->96550 96577 c12f78 96575->96577 96622 c34a28 40 API calls 3 library calls 96577->96622 96578 c52d90 96580 c12f83 96580->96554 96581 c12f8d 96580->96581 96623 c34a28 40 API calls 3 library calls 96581->96623 96583 c12f98 96584 c12fdc 96583->96584 96624 c13084 22 API calls 96583->96624 96584->96568 96585 c12fe8 96584->96585 96585->96578 96627 c163eb 22 API calls 96585->96627 96587 c12fbf 96625 c1a8c7 22 API calls __fread_nolock 96587->96625 96589 c12ff8 96628 c16a50 22 API calls 96589->96628 96592 c12fcd 96626 c13084 22 API calls 96592->96626 96593 c13006 96629 c170b0 23 API calls 96593->96629 96598 c13021 96599 c13065 96598->96599 96630 c16f88 22 API calls 96598->96630 96631 c170b0 23 API calls 96598->96631 96632 c13084 22 API calls 96598->96632 96602 c14af0 __wsopen_s 96601->96602 96603 c16b57 22 API calls 96602->96603 96604 c14b22 96602->96604 96603->96604 96613 c14b58 96604->96613 96640 c14c6d 96604->96640 96606 c19cb3 22 API calls 96608 c14c52 96606->96608 96607 c19cb3 22 API calls 96607->96613 96609 c1515f 22 API calls 96608->96609 96611 c14c5e 96609->96611 96610 c1515f 22 API calls 96610->96613 96611->96526 96612 c14c29 96612->96606 96612->96611 96613->96607 96613->96610 96613->96612 96614 c14c6d 22 API calls 96613->96614 96614->96613 96615->96539 96616->96543 96617->96549 96618->96557 96619->96567 96620->96570 96621->96575 96622->96580 96623->96583 96624->96587 96625->96592 96626->96584 96627->96589 96628->96593 96629->96598 96630->96598 96631->96598 96632->96598 96633->96550 96634->96554 96635->96560 96636->96564 96637->96568 96638->96574 96639->96578 96641 c1aec9 22 API calls 96640->96641 96642 c14c78 96641->96642 96642->96604 96643 c13156 96646 c13170 96643->96646 96647 c13187 96646->96647 96648 c131eb 96647->96648 96649 c1318c 96647->96649 96686 c131e9 96647->96686 96651 c131f1 96648->96651 96652 c52dfb 96648->96652 96653 c13265 PostQuitMessage 96649->96653 96654 c13199 96649->96654 96650 c131d0 DefWindowProcW 96660 c1316a 96650->96660 96655 c131f8 96651->96655 96656 c1321d SetTimer RegisterWindowMessageW 96651->96656 96701 c118e2 10 API calls 96652->96701 96653->96660 96658 c131a4 96654->96658 96659 c52e7c 96654->96659 96661 c13201 KillTimer 96655->96661 96662 c52d9c 96655->96662 96656->96660 96664 c13246 CreatePopupMenu 96656->96664 96665 c52e68 96658->96665 96666 c131ae 96658->96666 96704 c7bf30 34 API calls ___scrt_fastfail 96659->96704 96670 c130f2 Shell_NotifyIconW 96661->96670 96668 c52dd7 MoveWindow 96662->96668 96669 c52da1 96662->96669 96663 c52e1c 96702 c2e499 42 API calls 96663->96702 96664->96660 96691 c7c161 96665->96691 96673 c52e4d 96666->96673 96674 c131b9 96666->96674 96668->96660 96676 c52da7 96669->96676 96677 c52dc6 SetFocus 96669->96677 96678 c13214 96670->96678 96673->96650 96703 c70ad7 22 API calls 96673->96703 96679 c131c4 96674->96679 96680 c13253 96674->96680 96675 c52e8e 96675->96650 96675->96660 96676->96679 96681 c52db0 96676->96681 96677->96660 96698 c13c50 DeleteObject DestroyWindow 96678->96698 96679->96650 96688 c130f2 Shell_NotifyIconW 96679->96688 96699 c1326f 44 API calls ___scrt_fastfail 96680->96699 96700 c118e2 10 API calls 96681->96700 96686->96650 96687 c13263 96687->96660 96689 c52e41 96688->96689 96690 c13837 49 API calls 96689->96690 96690->96686 96692 c7c276 96691->96692 96693 c7c179 ___scrt_fastfail 96691->96693 96692->96660 96694 c13923 24 API calls 96693->96694 96696 c7c1a0 96694->96696 96695 c7c25f KillTimer SetTimer 96695->96692 96696->96695 96697 c7c251 Shell_NotifyIconW 96696->96697 96697->96695 96698->96660 96699->96687 96700->96660 96701->96663 96702->96679 96703->96686 96704->96675 96705 c303fb 96706 c30407 ___BuildCatchObject 96705->96706 96734 c2feb1 96706->96734 96708 c3040e 96709 c30561 96708->96709 96712 c30438 96708->96712 96764 c3083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 96709->96764 96711 c30568 96757 c34e52 96711->96757 96722 c30477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 96712->96722 96745 c4247d 96712->96745 96719 c30457 96721 c304d8 96753 c30959 96721->96753 96722->96721 96760 c34e1a 38 API calls 3 library calls 96722->96760 96725 c304de 96726 c304f3 96725->96726 96761 c30992 GetModuleHandleW 96726->96761 96728 c304fa 96728->96711 96729 c304fe 96728->96729 96730 c30507 96729->96730 96762 c34df5 28 API calls _abort 96729->96762 96763 c30040 13 API calls 2 library calls 96730->96763 96733 c3050f 96733->96719 96735 c2feba 96734->96735 96766 c30698 IsProcessorFeaturePresent 96735->96766 96737 c2fec6 96767 c32c94 10 API calls 3 library calls 96737->96767 96739 c2fecb 96740 c2fecf 96739->96740 96768 c42317 96739->96768 96740->96708 96743 c2fee6 96743->96708 96748 c42494 96745->96748 96746 c30a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 96747 c30451 96746->96747 96747->96719 96749 c42421 96747->96749 96748->96746 96750 c42450 96749->96750 96751 c30a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 96750->96751 96752 c42479 96751->96752 96752->96722 96800 c32340 96753->96800 96756 c3097f 96756->96725 96802 c34bcf 96757->96802 96760->96721 96761->96728 96762->96730 96763->96733 96764->96711 96766->96737 96767->96739 96772 c4d1f6 96768->96772 96771 c32cbd 8 API calls 3 library calls 96771->96740 96773 c4d213 96772->96773 96776 c4d20f 96772->96776 96773->96776 96778 c44bfb 96773->96778 96775 c2fed8 96775->96743 96775->96771 96788 c30a8c 96776->96788 96779 c44c07 ___BuildCatchObject 96778->96779 96795 c42f5e EnterCriticalSection 96779->96795 96781 c44c2c 96798 c44c48 LeaveCriticalSection _abort 96781->96798 96782 c44c0e 96782->96781 96796 c44a8f GetStartupInfoW GetFileType 96782->96796 96785 c44c3d __wsopen_s 96785->96773 96786 c44c27 96797 c44b45 GetStdHandle GetFileType 96786->96797 96789 c30a97 IsProcessorFeaturePresent 96788->96789 96790 c30a95 96788->96790 96792 c30c5d 96789->96792 96790->96775 96799 c30c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96792->96799 96794 c30d40 96794->96775 96795->96782 96796->96786 96797->96781 96798->96785 96799->96794 96801 c3096c GetStartupInfoW 96800->96801 96801->96756 96803 c34bdb CallUnexpected 96802->96803 96804 c34be2 96803->96804 96805 c34bf4 96803->96805 96841 c34d29 GetModuleHandleW 96804->96841 96826 c42f5e EnterCriticalSection 96805->96826 96808 c34be7 96808->96805 96842 c34d6d GetModuleHandleExW 96808->96842 96811 c34bfb 96817 c34c70 96811->96817 96823 c34c99 96811->96823 96827 c421a8 96811->96827 96814 c34ce2 96850 c51d29 5 API calls __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 96814->96850 96815 c34cb6 96833 c34ce8 96815->96833 96816 c34c88 96818 c42421 _abort 5 API calls 96816->96818 96817->96816 96822 c42421 _abort 5 API calls 96817->96822 96818->96823 96822->96816 96830 c34cd9 96823->96830 96826->96811 96851 c41ee1 96827->96851 96870 c42fa6 LeaveCriticalSection 96830->96870 96832 c34cb2 96832->96814 96832->96815 96871 c4360c 96833->96871 96836 c34d16 96838 c34d6d _abort 8 API calls 96836->96838 96837 c34cf6 GetPEB 96837->96836 96839 c34d06 GetCurrentProcess TerminateProcess 96837->96839 96840 c34d1e ExitProcess 96838->96840 96839->96836 96841->96808 96843 c34d97 GetProcAddress 96842->96843 96844 c34dba 96842->96844 96847 c34dac 96843->96847 96845 c34dc0 FreeLibrary 96844->96845 96846 c34dc9 96844->96846 96845->96846 96848 c30a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 96846->96848 96847->96844 96849 c34bf3 96848->96849 96849->96805 96854 c41e90 96851->96854 96853 c41f05 96853->96817 96855 c41e9c ___BuildCatchObject 96854->96855 96862 c42f5e EnterCriticalSection 96855->96862 96857 c41eaa 96863 c41f31 96857->96863 96861 c41ec8 __wsopen_s 96861->96853 96862->96857 96866 c41f51 96863->96866 96867 c41f59 96863->96867 96864 c30a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 96865 c41eb7 96864->96865 96869 c41ed5 LeaveCriticalSection _abort 96865->96869 96866->96864 96867->96866 96868 c429c8 _free 20 API calls 96867->96868 96868->96866 96869->96861 96870->96832 96872 c43627 96871->96872 96873 c43631 96871->96873 96875 c30a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 96872->96875 96878 c42fd7 5 API calls 2 library calls 96873->96878 96876 c34cf2 96875->96876 96876->96836 96876->96837 96877 c43648 96877->96872 96878->96877 96879 c11098 96884 c142de 96879->96884 96883 c110a7 96885 c1a961 22 API calls 96884->96885 96886 c142f5 GetVersionExW 96885->96886 96887 c16b57 22 API calls 96886->96887 96888 c14342 96887->96888 96889 c193b2 22 API calls 96888->96889 96898 c14378 96888->96898 96890 c1436c 96889->96890 96892 c137a0 22 API calls 96890->96892 96891 c1441b GetCurrentProcess IsWow64Process 96893 c14437 96891->96893 96892->96898 96894 c53824 GetSystemInfo 96893->96894 96895 c1444f LoadLibraryA 96893->96895 96896 c14460 GetProcAddress 96895->96896 96897 c1449c GetSystemInfo 96895->96897 96896->96897 96900 c14470 GetNativeSystemInfo 96896->96900 96901 c14476 96897->96901 96898->96891 96899 c537df 96898->96899 96900->96901 96902 c1109d 96901->96902 96903 c1447a FreeLibrary 96901->96903 96904 c300a3 29 API calls __onexit 96902->96904 96903->96902 96904->96883 96905 c1105b 96910 c1344d 96905->96910 96907 c1106a 96941 c300a3 29 API calls __onexit 96907->96941 96909 c11074 96911 c1345d __wsopen_s 96910->96911 96912 c1a961 22 API calls 96911->96912 96913 c13513 96912->96913 96914 c13a5a 24 API calls 96913->96914 96915 c1351c 96914->96915 96942 c13357 96915->96942 96918 c133c6 22 API calls 96919 c13535 96918->96919 96920 c1515f 22 API calls 96919->96920 96921 c13544 96920->96921 96922 c1a961 22 API calls 96921->96922 96923 c1354d 96922->96923 96924 c1a6c3 22 API calls 96923->96924 96925 c13556 RegOpenKeyExW 96924->96925 96926 c53176 RegQueryValueExW 96925->96926 96930 c13578 96925->96930 96927 c53193 96926->96927 96928 c5320c RegCloseKey 96926->96928 96929 c2fe0b 22 API calls 96927->96929 96928->96930 96940 c5321e _wcslen 96928->96940 96931 c531ac 96929->96931 96930->96907 96932 c15722 22 API calls 96931->96932 96933 c531b7 RegQueryValueExW 96932->96933 96934 c531d4 96933->96934 96937 c531ee messages 96933->96937 96935 c16b57 22 API calls 96934->96935 96935->96937 96936 c14c6d 22 API calls 96936->96940 96937->96928 96938 c19cb3 22 API calls 96938->96940 96939 c1515f 22 API calls 96939->96940 96940->96930 96940->96936 96940->96938 96940->96939 96941->96909 96943 c51f50 __wsopen_s 96942->96943 96944 c13364 GetFullPathNameW 96943->96944 96945 c13386 96944->96945 96946 c16b57 22 API calls 96945->96946 96947 c133a4 96946->96947 96947->96918 96948 c1defc 96951 c11d6f 96948->96951 96950 c1df07 96952 c11d8c 96951->96952 96953 c11f6f 348 API calls 96952->96953 96954 c11da6 96953->96954 96955 c52759 96954->96955 96957 c11e36 96954->96957 96958 c11dc2 96954->96958 96961 c8359c 82 API calls __wsopen_s 96955->96961 96957->96950 96958->96957 96960 c1289a 23 API calls 96958->96960 96960->96957 96961->96957 96962 c1f7bf 96963 c1f7d3 96962->96963 96964 c1fcb6 96962->96964 96966 c1fcc2 96963->96966 96967 c2fddb 22 API calls 96963->96967 96965 c1aceb 23 API calls 96964->96965 96965->96966 96968 c1aceb 23 API calls 96966->96968 96969 c1f7e5 96967->96969 96971 c1fd3d 96968->96971 96969->96966 96970 c1f83e 96969->96970 96969->96971 96973 c21310 348 API calls 96970->96973 96995 c1ed9d messages 96970->96995 96999 c81155 22 API calls 96971->96999 96994 c1ec76 messages 96973->96994 96974 c1fef7 96974->96995 97001 c1a8c7 22 API calls __fread_nolock 96974->97001 96976 c2fddb 22 API calls 96976->96994 96978 c64b0b 97003 c8359c 82 API calls __wsopen_s 96978->97003 96979 c1a8c7 22 API calls 96979->96994 96980 c64600 96980->96995 97000 c1a8c7 22 API calls __fread_nolock 96980->97000 96986 c30242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96986->96994 96987 c1fbe3 96990 c64bdc 96987->96990 96987->96995 96996 c1f3ae messages 96987->96996 96988 c1a961 22 API calls 96988->96994 96989 c300a3 29 API calls pre_c_initialization 96989->96994 97004 c8359c 82 API calls __wsopen_s 96990->97004 96992 c64beb 97005 c8359c 82 API calls __wsopen_s 96992->97005 96993 c301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96993->96994 96994->96974 96994->96976 96994->96978 96994->96979 96994->96980 96994->96986 96994->96987 96994->96988 96994->96989 96994->96992 96994->96993 96994->96995 96994->96996 96997 c201e0 348 API calls 2 library calls 96994->96997 96998 c206a0 41 API calls messages 96994->96998 96996->96995 97002 c8359c 82 API calls __wsopen_s 96996->97002 96997->96994 96998->96994 96999->96995 97000->96995 97001->96995 97002->96995 97003->96995 97004->96992 97005->96995 97006 ca2a55 97014 c81ebc 97006->97014 97009 ca2a70 97016 c739c0 22 API calls 97009->97016 97010 ca2a87 97012 ca2a7c 97017 c7417d 22 API calls __fread_nolock 97012->97017 97015 c81ec3 IsWindow 97014->97015 97015->97009 97015->97010 97016->97012 97017->97010

                                                                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                                                                  control_flow_graph 389 c142de-c1434d call c1a961 GetVersionExW call c16b57 394 c53617-c5362a 389->394 395 c14353 389->395 397 c5362b-c5362f 394->397 396 c14355-c14357 395->396 398 c53656 396->398 399 c1435d-c143bc call c193b2 call c137a0 396->399 400 c53631 397->400 401 c53632-c5363e 397->401 405 c5365d-c53660 398->405 418 c143c2-c143c4 399->418 419 c537df-c537e6 399->419 400->401 401->397 403 c53640-c53642 401->403 403->396 404 c53648-c5364f 403->404 404->394 407 c53651 404->407 408 c53666-c536a8 405->408 409 c1441b-c14435 GetCurrentProcess IsWow64Process 405->409 407->398 408->409 413 c536ae-c536b1 408->413 411 c14494-c1449a 409->411 412 c14437 409->412 415 c1443d-c14449 411->415 412->415 416 c536b3-c536bd 413->416 417 c536db-c536e5 413->417 420 c53824-c53828 GetSystemInfo 415->420 421 c1444f-c1445e LoadLibraryA 415->421 422 c536bf-c536c5 416->422 423 c536ca-c536d6 416->423 425 c536e7-c536f3 417->425 426 c536f8-c53702 417->426 418->405 424 c143ca-c143dd 418->424 427 c53806-c53809 419->427 428 c537e8 419->428 431 c14460-c1446e GetProcAddress 421->431 432 c1449c-c144a6 GetSystemInfo 421->432 422->409 423->409 433 c143e3-c143e5 424->433 434 c53726-c5372f 424->434 425->409 436 c53715-c53721 426->436 437 c53704-c53710 426->437 429 c537f4-c537fc 427->429 430 c5380b-c5381a 427->430 435 c537ee 428->435 429->427 430->435 440 c5381c-c53822 430->440 431->432 441 c14470-c14474 GetNativeSystemInfo 431->441 442 c14476-c14478 432->442 443 c5374d-c53762 433->443 444 c143eb-c143ee 433->444 438 c53731-c53737 434->438 439 c5373c-c53748 434->439 435->429 436->409 437->409 438->409 439->409 440->429 441->442 447 c14481-c14493 442->447 448 c1447a-c1447b FreeLibrary 442->448 445 c53764-c5376a 443->445 446 c5376f-c5377b 443->446 449 c53791-c53794 444->449 450 c143f4-c1440f 444->450 445->409 446->409 448->447 449->409 451 c5379a-c537c1 449->451 452 c14415 450->452 453 c53780-c5378c 450->453 454 c537c3-c537c9 451->454 455 c537ce-c537da 451->455 452->409 453->409 454->409 455->409
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetVersionExW.KERNEL32(?), ref: 00C1430D
                                                                                                                                                                                                                                                    • Part of subcall function 00C16B57: _wcslen.LIBCMT ref: 00C16B6A
                                                                                                                                                                                                                                                  • GetCurrentProcess.KERNEL32(?,00CACB64,00000000,?,?), ref: 00C14422
                                                                                                                                                                                                                                                  • IsWow64Process.KERNEL32(00000000,?,?), ref: 00C14429
                                                                                                                                                                                                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00C14454
                                                                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00C14466
                                                                                                                                                                                                                                                  • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00C14474
                                                                                                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000,?,?), ref: 00C1447B
                                                                                                                                                                                                                                                  • GetSystemInfo.KERNEL32(?,?,?), ref: 00C144A0
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                                                                                                                                                                                                  • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                                                                                                                                                                                                                  • API String ID: 3290436268-3101561225
                                                                                                                                                                                                                                                  • Opcode ID: 9054fbac982b842a12c3b1c6c8d7eca24878a2d8242a3588b87d5245ace48925
                                                                                                                                                                                                                                                  • Instruction ID: 00ec2336ef1c543ad38023a5fa6d034a1c7892a599ea07c86de51bba0ab7d87e
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9054fbac982b842a12c3b1c6c8d7eca24878a2d8242a3588b87d5245ace48925
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 14A1AF7A91A2C0CFC715C76978C07DD7FE46B27740B0C4899EC919BA32D2304AA8EB35

                                                                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                                                                  control_flow_graph 793 c142a2-c142ba CreateStreamOnHGlobal 794 c142da-c142dd 793->794 795 c142bc-c142d3 FindResourceExW 793->795 796 c142d9 795->796 797 c535ba-c535c9 LoadResource 795->797 796->794 797->796 798 c535cf-c535dd SizeofResource 797->798 798->796 799 c535e3-c535ee LockResource 798->799 799->796 800 c535f4-c53612 799->800 800->796
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00C150AA,?,?,00000000,00000000), ref: 00C142B2
                                                                                                                                                                                                                                                  • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00C150AA,?,?,00000000,00000000), ref: 00C142C9
                                                                                                                                                                                                                                                  • LoadResource.KERNEL32(?,00000000,?,?,00C150AA,?,?,00000000,00000000,?,?,?,?,?,?,00C14F20), ref: 00C535BE
                                                                                                                                                                                                                                                  • SizeofResource.KERNEL32(?,00000000,?,?,00C150AA,?,?,00000000,00000000,?,?,?,?,?,?,00C14F20), ref: 00C535D3
                                                                                                                                                                                                                                                  • LockResource.KERNEL32(00C150AA,?,?,00C150AA,?,?,00000000,00000000,?,?,?,?,?,?,00C14F20,?), ref: 00C535E6
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                                                                                                                                                                                                  • String ID: SCRIPT
                                                                                                                                                                                                                                                  • API String ID: 3051347437-3967369404
                                                                                                                                                                                                                                                  • Opcode ID: a81b450935b30b3287b089d41ece0d4693275a3ad6d6da2d72b8b11fd69739a2
                                                                                                                                                                                                                                                  • Instruction ID: 4c0e2933427ecad6c5d3e03e0c0412d0cbe54eecea7ad962aab9cb8bd1a80479
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: a81b450935b30b3287b089d41ece0d4693275a3ad6d6da2d72b8b11fd69739a2
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9C118E74200701BFD7258B65DC88F6B7BBAEBC6B55F104269F412D7290DB71DD809630

                                                                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00C12B6B
                                                                                                                                                                                                                                                    • Part of subcall function 00C13A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00CE1418,?,00C12E7F,?,?,?,00000000), ref: 00C13A78
                                                                                                                                                                                                                                                    • Part of subcall function 00C19CB3: _wcslen.LIBCMT ref: 00C19CBD
                                                                                                                                                                                                                                                  • GetForegroundWindow.USER32(runas,?,?,?,?,?,00CD2224), ref: 00C52C10
                                                                                                                                                                                                                                                  • ShellExecuteW.SHELL32(00000000,?,?,00CD2224), ref: 00C52C17
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                                                                                                                                                                                                                  • String ID: runas
                                                                                                                                                                                                                                                  • API String ID: 448630720-4000483414
                                                                                                                                                                                                                                                  • Opcode ID: a70749460ac25788f82ccf12ef863fbe4cfed4324aa837194498366e0d822a6e
                                                                                                                                                                                                                                                  • Instruction ID: 043c371ec30d91d6f84e777cb1e76fb961f4dc176c549995510bac20d38490db
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: a70749460ac25788f82ccf12ef863fbe4cfed4324aa837194498366e0d822a6e
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: D611D2312083819BC714FF60D8A1AFE77A49B93314F48142EB593061A2CF308ADAB752

                                                                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 00C7D501
                                                                                                                                                                                                                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 00C7D50F
                                                                                                                                                                                                                                                  • Process32NextW.KERNEL32(00000000,?), ref: 00C7D52F
                                                                                                                                                                                                                                                  • CloseHandle.KERNELBASE(00000000), ref: 00C7D5DC
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 420147892-0
                                                                                                                                                                                                                                                  • Opcode ID: 884e07e3f9e233761377bd1502fcba5992fe7b7ebe155c8b7fe03bf93b268b6e
                                                                                                                                                                                                                                                  • Instruction ID: 52d1ebe0b54dfb3044c0dd0acd2311c227f65100d6b94fa61d51e5d6488be01f
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 884e07e3f9e233761377bd1502fcba5992fe7b7ebe155c8b7fe03bf93b268b6e
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: EB31C2711083009FD300EF54C891BAFBBF8EF9A354F10492DF596831A1EB719A85DB92

                                                                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                                                                  control_flow_graph 993 c7dbbe-c7dbda lstrlenW 994 c7dc06 993->994 995 c7dbdc-c7dbe6 GetFileAttributesW 993->995 996 c7dc09-c7dc0d 994->996 995->996 997 c7dbe8-c7dbf7 FindFirstFileW 995->997 997->994 998 c7dbf9-c7dc04 FindClose 997->998 998->996
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • lstrlenW.KERNEL32(?,00C55222), ref: 00C7DBCE
                                                                                                                                                                                                                                                  • GetFileAttributesW.KERNELBASE(?), ref: 00C7DBDD
                                                                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00C7DBEE
                                                                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00C7DBFA
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: FileFind$AttributesCloseFirstlstrlen
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2695905019-0
                                                                                                                                                                                                                                                  • Opcode ID: 09936a12f3b828499f5ad5561e9a90abf904e6ea74b02d1446beaba855f16bad
                                                                                                                                                                                                                                                  • Instruction ID: e0794c964b10a23d153e378ba6399be198a66a8eee4deb213e2b266c6d930c75
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 09936a12f3b828499f5ad5561e9a90abf904e6ea74b02d1446beaba855f16bad
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 43F0A9308109106783216B78AC4DAAE37BC9F02338F108702F83BC20F0EBB09E948696
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetCurrentProcess.KERNEL32(00C428E9,?,00C34CBE,00C428E9,00CD88B8,0000000C,00C34E15,00C428E9,00000002,00000000,?,00C428E9), ref: 00C34D09
                                                                                                                                                                                                                                                  • TerminateProcess.KERNEL32(00000000,?,00C34CBE,00C428E9,00CD88B8,0000000C,00C34E15,00C428E9,00000002,00000000,?,00C428E9), ref: 00C34D10
                                                                                                                                                                                                                                                  • ExitProcess.KERNEL32 ref: 00C34D22
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Process$CurrentExitTerminate
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1703294689-0
                                                                                                                                                                                                                                                  • Opcode ID: e75662ccd4da236ffea0e86434a227be8e05ef92e74809bf54268809dfef3741
                                                                                                                                                                                                                                                  • Instruction ID: 429575f8c5f58df28a44c2bd8217250b843c43b2bb9ab45a6a6a540bd2adab8f
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e75662ccd4da236ffea0e86434a227be8e05ef92e74809bf54268809dfef3741
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 20E0B631011148ABCF15AF54DD49B9D3B79FB42795F104014FD159B132CB39EE42DA80

                                                                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                                                                  control_flow_graph 0 c9aff9-c9b056 call c32340 3 c9b058-c9b06b call c1b567 0->3 4 c9b094-c9b098 0->4 12 c9b0c8 3->12 13 c9b06d-c9b092 call c1b567 * 2 3->13 6 c9b09a-c9b0bb call c1b567 * 2 4->6 7 c9b0dd-c9b0e0 4->7 29 c9b0bf-c9b0c4 6->29 9 c9b0e2-c9b0e5 7->9 10 c9b0f5-c9b119 call c17510 call c17620 7->10 14 c9b0e8-c9b0ed call c1b567 9->14 31 c9b1d8-c9b1e0 10->31 32 c9b11f-c9b178 call c17510 call c17620 call c17510 call c17620 call c17510 call c17620 10->32 17 c9b0cb-c9b0cf 12->17 13->29 14->10 23 c9b0d9-c9b0db 17->23 24 c9b0d1-c9b0d7 17->24 23->7 23->10 24->14 29->7 33 c9b0c6 29->33 36 c9b20a-c9b238 GetCurrentDirectoryW call c2fe0b GetCurrentDirectoryW 31->36 37 c9b1e2-c9b1fd call c17510 call c17620 31->37 82 c9b17a-c9b195 call c17510 call c17620 32->82 83 c9b1a6-c9b1d6 GetSystemDirectoryW call c2fe0b GetSystemDirectoryW 32->83 33->17 45 c9b23c 36->45 37->36 53 c9b1ff-c9b208 call c34963 37->53 48 c9b240-c9b244 45->48 51 c9b275-c9b285 call c800d9 48->51 52 c9b246-c9b270 call c19c6e * 3 48->52 62 c9b28b-c9b2e1 call c807c0 call c806e6 call c805a7 51->62 63 c9b287-c9b289 51->63 52->51 53->36 53->51 66 c9b2ee-c9b2f2 62->66 98 c9b2e3 62->98 63->66 71 c9b2f8-c9b321 call c711c8 66->71 72 c9b39a-c9b3be CreateProcessW 66->72 87 c9b32a call c714ce 71->87 88 c9b323-c9b328 call c71201 71->88 76 c9b3c1-c9b3d4 call c2fe14 * 2 72->76 103 c9b42f-c9b43d CloseHandle 76->103 104 c9b3d6-c9b3e8 76->104 82->83 105 c9b197-c9b1a0 call c34963 82->105 83->45 97 c9b32f-c9b33c call c34963 87->97 88->97 113 c9b33e-c9b345 97->113 114 c9b347-c9b357 call c34963 97->114 98->66 107 c9b49c 103->107 108 c9b43f-c9b444 103->108 109 c9b3ea 104->109 110 c9b3ed-c9b3fc 104->110 105->48 105->83 111 c9b4a0-c9b4a4 107->111 115 c9b451-c9b456 108->115 116 c9b446-c9b44c CloseHandle 108->116 109->110 117 c9b3fe 110->117 118 c9b401-c9b42a GetLastError call c1630c call c1cfa0 110->118 120 c9b4b2-c9b4bc 111->120 121 c9b4a6-c9b4b0 111->121 113->113 113->114 136 c9b359-c9b360 114->136 137 c9b362-c9b372 call c34963 114->137 124 c9b458-c9b45e CloseHandle 115->124 125 c9b463-c9b468 115->125 116->115 117->118 127 c9b4e5-c9b4f6 call c80175 118->127 128 c9b4be 120->128 129 c9b4c4-c9b4e3 call c1cfa0 CloseHandle 120->129 121->127 124->125 131 c9b46a-c9b470 CloseHandle 125->131 132 c9b475-c9b49a call c809d9 call c9b536 125->132 128->129 129->127 131->132 132->111 136->136 136->137 146 c9b37d-c9b398 call c2fe14 * 3 137->146 147 c9b374-c9b37b 137->147 146->76 147->146 147->147
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C9B198
                                                                                                                                                                                                                                                  • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00C9B1B0
                                                                                                                                                                                                                                                  • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00C9B1D4
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C9B200
                                                                                                                                                                                                                                                  • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00C9B214
                                                                                                                                                                                                                                                  • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00C9B236
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C9B332
                                                                                                                                                                                                                                                    • Part of subcall function 00C805A7: GetStdHandle.KERNEL32(000000F6), ref: 00C805C6
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C9B34B
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C9B366
                                                                                                                                                                                                                                                  • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00C9B3B6
                                                                                                                                                                                                                                                  • GetLastError.KERNEL32(00000000), ref: 00C9B407
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?), ref: 00C9B439
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00C9B44A
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00C9B45C
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00C9B46E
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?), ref: 00C9B4E3
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2178637699-0
                                                                                                                                                                                                                                                  • Opcode ID: f3b7e162ad50a554a9355a315806f83af4245752ed1eecb1580b5ca245bb4757
                                                                                                                                                                                                                                                  • Instruction ID: b5a8aa7ba803b0b4d8a8e503a6206523dae2da3d936dcf593ce183da7a799fde
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: f3b7e162ad50a554a9355a315806f83af4245752ed1eecb1580b5ca245bb4757
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 73F1CC31608300AFCB14EF24D995B6EBBE1BF86314F14855DF8998B2A2DB30ED45DB52
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetInputState.USER32 ref: 00C1D807
                                                                                                                                                                                                                                                  • timeGetTime.WINMM ref: 00C1DA07
                                                                                                                                                                                                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00C1DB28
                                                                                                                                                                                                                                                  • TranslateMessage.USER32(?), ref: 00C1DB7B
                                                                                                                                                                                                                                                  • DispatchMessageW.USER32(?), ref: 00C1DB89
                                                                                                                                                                                                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00C1DB9F
                                                                                                                                                                                                                                                  • Sleep.KERNELBASE(0000000A), ref: 00C1DBB1
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2189390790-0
                                                                                                                                                                                                                                                  • Opcode ID: 25e6bc85e33c5387efecb5b07527a0766032629d6f35b39f190208645c13bb65
                                                                                                                                                                                                                                                  • Instruction ID: 90e365294742a14d75217ce096e4bc14b5023af810bcd387cbabac1582fb299d
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 25e6bc85e33c5387efecb5b07527a0766032629d6f35b39f190208645c13bb65
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: B842D130608741EFD738CF25C894BAAB7E0BF86314F18455DE8668B291D774E984EB92

                                                                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 00C12D07
                                                                                                                                                                                                                                                  • RegisterClassExW.USER32(00000030), ref: 00C12D31
                                                                                                                                                                                                                                                  • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00C12D42
                                                                                                                                                                                                                                                  • InitCommonControlsEx.COMCTL32(?), ref: 00C12D5F
                                                                                                                                                                                                                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00C12D6F
                                                                                                                                                                                                                                                  • LoadIconW.USER32(000000A9), ref: 00C12D85
                                                                                                                                                                                                                                                  • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00C12D94
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                                                                                                                                                                                  • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                                                                                                                                                                                  • API String ID: 2914291525-1005189915
                                                                                                                                                                                                                                                  • Opcode ID: 36a716933413980eb2cb5f4cf1b4d77d3d1495a68966a44cfb71b26ed5d91faf
                                                                                                                                                                                                                                                  • Instruction ID: 1c7d4c877c04d4dfb3d4564492cf2e7cd79d5ae21b4bb76a43912dfe3b0da3b6
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 36a716933413980eb2cb5f4cf1b4d77d3d1495a68966a44cfb71b26ed5d91faf
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: CA21C0B5901258AFDB00DFA4E889BEDBBB4FB09704F04811AF911AB2A0D7B54594CFA1

                                                                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                                                                  control_flow_graph 457 c5065b-c5068b call c5042f 460 c506a6-c506b2 call c45221 457->460 461 c5068d-c50698 call c3f2c6 457->461 467 c506b4-c506c9 call c3f2c6 call c3f2d9 460->467 468 c506cb-c50714 call c5039a 460->468 466 c5069a-c506a1 call c3f2d9 461->466 478 c5097d-c50983 466->478 467->466 476 c50716-c5071f 468->476 477 c50781-c5078a GetFileType 468->477 480 c50756-c5077c GetLastError call c3f2a3 476->480 481 c50721-c50725 476->481 482 c507d3-c507d6 477->482 483 c5078c-c507bd GetLastError call c3f2a3 CloseHandle 477->483 480->466 481->480 487 c50727-c50754 call c5039a 481->487 485 c507df-c507e5 482->485 486 c507d8-c507dd 482->486 483->466 494 c507c3-c507ce call c3f2d9 483->494 490 c507e9-c50837 call c4516a 485->490 491 c507e7 485->491 486->490 487->477 487->480 500 c50847-c5086b call c5014d 490->500 501 c50839-c50845 call c505ab 490->501 491->490 494->466 506 c5086d 500->506 507 c5087e-c508c1 500->507 501->500 508 c5086f-c50879 call c486ae 501->508 506->508 510 c508c3-c508c7 507->510 511 c508e2-c508f0 507->511 508->478 510->511 513 c508c9-c508dd 510->513 514 c508f6-c508fa 511->514 515 c5097b 511->515 513->511 514->515 516 c508fc-c5092f CloseHandle call c5039a 514->516 515->478 519 c50931-c5095d GetLastError call c3f2a3 call c45333 516->519 520 c50963-c50977 516->520 519->520 520->515
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C5039A: CreateFileW.KERNELBASE(00000000,00000000,?,00C50704,?,?,00000000,?,00C50704,00000000,0000000C), ref: 00C503B7
                                                                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00C5076F
                                                                                                                                                                                                                                                  • __dosmaperr.LIBCMT ref: 00C50776
                                                                                                                                                                                                                                                  • GetFileType.KERNELBASE(00000000), ref: 00C50782
                                                                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00C5078C
                                                                                                                                                                                                                                                  • __dosmaperr.LIBCMT ref: 00C50795
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00C507B5
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?), ref: 00C508FF
                                                                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00C50931
                                                                                                                                                                                                                                                  • __dosmaperr.LIBCMT ref: 00C50938
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                                                                                                                                                                  • String ID: H
                                                                                                                                                                                                                                                  • API String ID: 4237864984-2852464175
                                                                                                                                                                                                                                                  • Opcode ID: 35a7adf53de6d4f703e6893153b5827e42c5896310c07152b4f0b1f9018ea977
                                                                                                                                                                                                                                                  • Instruction ID: 30d99db9e7d8987fb7ddf2dd052cac0213afdccb5a6eb3ea9ddab646c7530014
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 35a7adf53de6d4f703e6893153b5827e42c5896310c07152b4f0b1f9018ea977
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9EA12636A101448FDF19AF68D891BAE3BA0AB06321F24015DFC21DF2E2DB319957DB95

                                                                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C13A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00CE1418,?,00C12E7F,?,?,?,00000000), ref: 00C13A78
                                                                                                                                                                                                                                                    • Part of subcall function 00C13357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00C13379
                                                                                                                                                                                                                                                  • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00C1356A
                                                                                                                                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00C5318D
                                                                                                                                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00C531CE
                                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 00C53210
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C53277
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C53286
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                                                                                                                                                                                                  • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                                                                                                                                                                                                  • API String ID: 98802146-2727554177
                                                                                                                                                                                                                                                  • Opcode ID: 35ac55827660db68a10239d8b57a05664e57e2325d332b6a6e72b02aa90729a5
                                                                                                                                                                                                                                                  • Instruction ID: 8687072356afe90e85c7c45855d5cd7d6f0c682baf913dfb78799dff174b804e
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 35ac55827660db68a10239d8b57a05664e57e2325d332b6a6e72b02aa90729a5
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 297148714043819AC314DF65EC82BAFBBECBB86744F40042EF555861B1EB749A89AB62

                                                                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 00C12B8E
                                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 00C12B9D
                                                                                                                                                                                                                                                  • LoadIconW.USER32(00000063), ref: 00C12BB3
                                                                                                                                                                                                                                                  • LoadIconW.USER32(000000A4), ref: 00C12BC5
                                                                                                                                                                                                                                                  • LoadIconW.USER32(000000A2), ref: 00C12BD7
                                                                                                                                                                                                                                                  • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00C12BEF
                                                                                                                                                                                                                                                  • RegisterClassExW.USER32(?), ref: 00C12C40
                                                                                                                                                                                                                                                    • Part of subcall function 00C12CD4: GetSysColorBrush.USER32(0000000F), ref: 00C12D07
                                                                                                                                                                                                                                                    • Part of subcall function 00C12CD4: RegisterClassExW.USER32(00000030), ref: 00C12D31
                                                                                                                                                                                                                                                    • Part of subcall function 00C12CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00C12D42
                                                                                                                                                                                                                                                    • Part of subcall function 00C12CD4: InitCommonControlsEx.COMCTL32(?), ref: 00C12D5F
                                                                                                                                                                                                                                                    • Part of subcall function 00C12CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00C12D6F
                                                                                                                                                                                                                                                    • Part of subcall function 00C12CD4: LoadIconW.USER32(000000A9), ref: 00C12D85
                                                                                                                                                                                                                                                    • Part of subcall function 00C12CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00C12D94
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                                                                                                                                                                                  • String ID: #$0$AutoIt v3
                                                                                                                                                                                                                                                  • API String ID: 423443420-4155596026
                                                                                                                                                                                                                                                  • Opcode ID: 1e8d95ca539a424fa21e4a85b22152be31a50f8e700745a489dc7f95bbc2b61a
                                                                                                                                                                                                                                                  • Instruction ID: 19a7c52f90b5c3769f736ce362bbd25ec9bb12484476cf9ad94fbf5ac86883ab
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1e8d95ca539a424fa21e4a85b22152be31a50f8e700745a489dc7f95bbc2b61a
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 87210974E00358ABDB109FA5ECD5BAD7FB4FB49B54F08001AEA00AB6B0D7B115A0DF90

                                                                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                                                                  control_flow_graph 598 c13170-c13185 599 c131e5-c131e7 598->599 600 c13187-c1318a 598->600 599->600 601 c131e9 599->601 602 c131eb 600->602 603 c1318c-c13193 600->603 604 c131d0-c131d8 DefWindowProcW 601->604 605 c131f1-c131f6 602->605 606 c52dfb-c52e23 call c118e2 call c2e499 602->606 607 c13265-c1326d PostQuitMessage 603->607 608 c13199-c1319e 603->608 614 c131de-c131e4 604->614 609 c131f8-c131fb 605->609 610 c1321d-c13244 SetTimer RegisterWindowMessageW 605->610 644 c52e28-c52e2f 606->644 615 c13219-c1321b 607->615 612 c131a4-c131a8 608->612 613 c52e7c-c52e90 call c7bf30 608->613 616 c13201-c1320f KillTimer call c130f2 609->616 617 c52d9c-c52d9f 609->617 610->615 619 c13246-c13251 CreatePopupMenu 610->619 620 c52e68-c52e72 call c7c161 612->620 621 c131ae-c131b3 612->621 613->615 639 c52e96 613->639 615->614 634 c13214 call c13c50 616->634 623 c52dd7-c52df6 MoveWindow 617->623 624 c52da1-c52da5 617->624 619->615 635 c52e77 620->635 628 c52e4d-c52e54 621->628 629 c131b9-c131be 621->629 623->615 631 c52da7-c52daa 624->631 632 c52dc6-c52dd2 SetFocus 624->632 628->604 633 c52e5a-c52e63 call c70ad7 628->633 637 c13253-c13263 call c1326f 629->637 638 c131c4-c131ca 629->638 631->638 640 c52db0-c52dc1 call c118e2 631->640 632->615 633->604 634->615 635->615 637->615 638->604 638->644 639->604 640->615 644->604 648 c52e35-c52e48 call c130f2 call c13837 644->648 648->604
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00C1316A,?,?), ref: 00C131D8
                                                                                                                                                                                                                                                  • KillTimer.USER32(?,00000001,?,?,?,?,?,00C1316A,?,?), ref: 00C13204
                                                                                                                                                                                                                                                  • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00C13227
                                                                                                                                                                                                                                                  • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00C1316A,?,?), ref: 00C13232
                                                                                                                                                                                                                                                  • CreatePopupMenu.USER32 ref: 00C13246
                                                                                                                                                                                                                                                  • PostQuitMessage.USER32(00000000), ref: 00C13267
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                                                                                                                                                                                  • String ID: TaskbarCreated
                                                                                                                                                                                                                                                  • API String ID: 129472671-2362178303
                                                                                                                                                                                                                                                  • Opcode ID: f35fc72eb2e85817302ae84d4f73f6eee694d104f5283e7ac98b0ce6f50a2b03
                                                                                                                                                                                                                                                  • Instruction ID: d46796c791ab758441ec2adf3e18bdbcba7e6592128a4572dddf4386568b1ef1
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: f35fc72eb2e85817302ae84d4f73f6eee694d104f5283e7ac98b0ce6f50a2b03
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6B4104353402C4ABDF156B789D8EBFD3A59E707348F180125FD229A1A2CB718BD0B7A5

                                                                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                                                                  control_flow_graph 654 c11410-c11449 655 c524b8-c524b9 DestroyWindow 654->655 656 c1144f-c11465 mciSendStringW 654->656 659 c524c4-c524d1 655->659 657 c116c6-c116d3 656->657 658 c1146b-c11473 656->658 661 c116d5-c116f0 UnregisterHotKey 657->661 662 c116f8-c116ff 657->662 658->659 660 c11479-c11488 call c1182e 658->660 663 c52500-c52507 659->663 664 c524d3-c524d6 659->664 675 c5250e-c5251a 660->675 676 c1148e-c11496 660->676 661->662 666 c116f2-c116f3 call c110d0 661->666 662->658 667 c11705 662->667 663->659 672 c52509 663->672 668 c524e2-c524e5 FindClose 664->668 669 c524d8-c524e0 call c16246 664->669 666->662 667->657 674 c524eb-c524f8 668->674 669->674 672->675 674->663 678 c524fa-c524fb call c832b1 674->678 681 c52524-c5252b 675->681 682 c5251c-c5251e FreeLibrary 675->682 679 c52532-c5253f 676->679 680 c1149c-c114c1 call c1cfa0 676->680 678->663 683 c52566-c5256d 679->683 684 c52541-c5255e VirtualFree 679->684 692 c114c3 680->692 693 c114f8-c11503 CoUninitialize 680->693 681->675 687 c5252d 681->687 682->681 683->679 689 c5256f 683->689 684->683 688 c52560-c52561 call c83317 684->688 687->679 688->683 694 c52574-c52578 689->694 696 c114c6-c114f6 call c11a05 call c119ae 692->696 693->694 695 c11509-c1150e 693->695 694->695 699 c5257e-c52584 694->699 697 c11514-c1151e 695->697 698 c52589-c52596 call c832eb 695->698 696->693 701 c11524-c115a5 call c1988f call c11944 call c117d5 call c2fe14 call c1177c call c1988f call c1cfa0 call c117fe call c2fe14 697->701 702 c11707-c11714 call c2f80e 697->702 712 c52598 698->712 699->695 716 c5259d-c525bf call c2fdcd 701->716 744 c115ab-c115cf call c2fe14 701->744 702->701 715 c1171a 702->715 712->716 715->702 722 c525c1 716->722 725 c525c6-c525e8 call c2fdcd 722->725 731 c525ea 725->731 735 c525ef-c52611 call c2fdcd 731->735 741 c52613 735->741 743 c52618-c52625 call c764d4 741->743 749 c52627 743->749 744->725 750 c115d5-c115f9 call c2fe14 744->750 752 c5262c-c52639 call c2ac64 749->752 750->735 755 c115ff-c11619 call c2fe14 750->755 758 c5263b 752->758 755->743 760 c1161f-c11643 call c117d5 call c2fe14 755->760 762 c52640-c5264d call c83245 758->762 760->752 769 c11649-c11651 760->769 768 c5264f 762->768 771 c52654-c52661 call c832cc 768->771 769->762 770 c11657-c11675 call c1988f call c1190a 769->770 770->771 780 c1167b-c11689 770->780 776 c52663 771->776 779 c52668-c52675 call c832cc 776->779 785 c52677 779->785 780->779 782 c1168f-c116c5 call c1988f * 3 call c11876 780->782 785->785
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00C11459
                                                                                                                                                                                                                                                  • CoUninitialize.COMBASE ref: 00C114F8
                                                                                                                                                                                                                                                  • UnregisterHotKey.USER32(?), ref: 00C116DD
                                                                                                                                                                                                                                                  • DestroyWindow.USER32(?), ref: 00C524B9
                                                                                                                                                                                                                                                  • FreeLibrary.KERNEL32(?), ref: 00C5251E
                                                                                                                                                                                                                                                  • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00C5254B
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                                                                                                                                                                                                  • String ID: close all
                                                                                                                                                                                                                                                  • API String ID: 469580280-3243417748
                                                                                                                                                                                                                                                  • Opcode ID: 109e96fa36c688e2dc0a38d01b783503218639478451ae57587f4170c0a75770
                                                                                                                                                                                                                                                  • Instruction ID: 7da344b8c766a0c4f43d7b9cc40758fc99ecfffd87bdd6359f57f2b3721dff44
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 109e96fa36c688e2dc0a38d01b783503218639478451ae57587f4170c0a75770
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 74D1BC35701222CFCB19EF15C495B69F7A0BF06700F1842ADE94A6B252DB30ED96EF54

                                                                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                                                                  control_flow_graph 803 c12c63-c12cd3 CreateWindowExW * 2 ShowWindow * 2
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00C12C91
                                                                                                                                                                                                                                                  • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00C12CB2
                                                                                                                                                                                                                                                  • ShowWindow.USER32(00000000,?,?,?,?,?,?,00C11CAD,?), ref: 00C12CC6
                                                                                                                                                                                                                                                  • ShowWindow.USER32(00000000,?,?,?,?,?,?,00C11CAD,?), ref: 00C12CCF
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Window$CreateShow
                                                                                                                                                                                                                                                  • String ID: AutoIt v3$edit
                                                                                                                                                                                                                                                  • API String ID: 1584632944-3779509399
                                                                                                                                                                                                                                                  • Opcode ID: 04508420b977fb657a491599c7604e435da302b71b7bc093500f792bc9eb9996
                                                                                                                                                                                                                                                  • Instruction ID: cc0d41caf27f697318ed4449e5c5936f409a6610955256f16a3eda67aebd9d68
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 04508420b977fb657a491599c7604e435da302b71b7bc093500f792bc9eb9996
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 32F0DA755402D47AEB311B27AC88F7B2EBDD7C7F54B04005AFD00AB5B0C6755861DAB0

                                                                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                                                                  control_flow_graph 954 c13b1c-c13b27 955 c13b99-c13b9b 954->955 956 c13b29-c13b2e 954->956 957 c13b8c-c13b8f 955->957 956->955 958 c13b30-c13b48 RegOpenKeyExW 956->958 958->955 959 c13b4a-c13b69 RegQueryValueExW 958->959 960 c13b80-c13b8b RegCloseKey 959->960 961 c13b6b-c13b76 959->961 960->957 962 c13b90-c13b97 961->962 963 c13b78-c13b7a 961->963 964 c13b7e 962->964 963->964 964->960
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00C13B0F,SwapMouseButtons,00000004,?), ref: 00C13B40
                                                                                                                                                                                                                                                  • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00C13B0F,SwapMouseButtons,00000004,?), ref: 00C13B61
                                                                                                                                                                                                                                                  • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00C13B0F,SwapMouseButtons,00000004,?), ref: 00C13B83
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CloseOpenQueryValue
                                                                                                                                                                                                                                                  • String ID: Control Panel\Mouse
                                                                                                                                                                                                                                                  • API String ID: 3677997916-824357125
                                                                                                                                                                                                                                                  • Opcode ID: 4428a9c7172f713559f41ab369e4d79d6479e0a584d309a084dbf5b453deedfe
                                                                                                                                                                                                                                                  • Instruction ID: e54e318c08de62905dd884eedb3853afc9dd9e293f29e7bae4cf01f05654693b
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4428a9c7172f713559f41ab369e4d79d6479e0a584d309a084dbf5b453deedfe
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: C6112AB5514248FFDB208FA5DC84AEFB7B8EF06748B104459A805D7110E2319F80A760
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00C533A2
                                                                                                                                                                                                                                                    • Part of subcall function 00C16B57: _wcslen.LIBCMT ref: 00C16B6A
                                                                                                                                                                                                                                                  • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00C13A04
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: IconLoadNotifyShell_String_wcslen
                                                                                                                                                                                                                                                  • String ID: Line:
                                                                                                                                                                                                                                                  • API String ID: 2289894680-1585850449
                                                                                                                                                                                                                                                  • Opcode ID: 4ae36c568394b21af86eb69db4fb393cd0ff9f93b1b484daf6742db61dd5d0ce
                                                                                                                                                                                                                                                  • Instruction ID: 202999eec10112e3722dd0046e4c040657baebdadd9527c5fb9dc0e535ad1169
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4ae36c568394b21af86eb69db4fb393cd0ff9f93b1b484daf6742db61dd5d0ce
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: D931F471408380AAC321EB20DC45BEFB7D8AF46714F04052AF9A9930A1DB709799E7C2
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00C30668
                                                                                                                                                                                                                                                    • Part of subcall function 00C332A4: RaiseException.KERNEL32(?,?,?,00C3068A,?,00CE1444,?,?,?,?,?,?,00C3068A,00C11129,00CD8738,00C11129), ref: 00C33304
                                                                                                                                                                                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00C30685
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Exception@8Throw$ExceptionRaise
                                                                                                                                                                                                                                                  • String ID: Unknown exception
                                                                                                                                                                                                                                                  • API String ID: 3476068407-410509341
                                                                                                                                                                                                                                                  • Opcode ID: 5ed8df610876abc6b0d93e91ad0d67513a478aafd682c3e32fac9d4910807970
                                                                                                                                                                                                                                                  • Instruction ID: f9ad7160a77ac0d975ef6911af2f38b09e0c2e160a441f63e1f4e2a7f52f226c
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5ed8df610876abc6b0d93e91ad0d67513a478aafd682c3e32fac9d4910807970
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0EF0CD3591020DB7CB00BAA9E856C9E7B7C9E00310F704536B924D6996EF71EB6ADA90
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C11BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00C11BF4
                                                                                                                                                                                                                                                    • Part of subcall function 00C11BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00C11BFC
                                                                                                                                                                                                                                                    • Part of subcall function 00C11BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00C11C07
                                                                                                                                                                                                                                                    • Part of subcall function 00C11BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00C11C12
                                                                                                                                                                                                                                                    • Part of subcall function 00C11BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00C11C1A
                                                                                                                                                                                                                                                    • Part of subcall function 00C11BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00C11C22
                                                                                                                                                                                                                                                    • Part of subcall function 00C11B4A: RegisterWindowMessageW.USER32(00000004,?,00C112C4), ref: 00C11BA2
                                                                                                                                                                                                                                                  • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00C1136A
                                                                                                                                                                                                                                                  • OleInitialize.OLE32 ref: 00C11388
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000,00000000), ref: 00C524AB
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1986988660-0
                                                                                                                                                                                                                                                  • Opcode ID: e69526323ca1a840daf37ab2cec5952b86b2b37b4ee241b40e7c9140ac5ec962
                                                                                                                                                                                                                                                  • Instruction ID: fc474dc0ef742d7fb5baeb16b23db9011aaea6c49752990738dbd2d1299ed5d2
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e69526323ca1a840daf37ab2cec5952b86b2b37b4ee241b40e7c9140ac5ec962
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8271BEB49023C08EC794DF7AA8C579D3AE4FB8935475D812ADC1ACB3A1EB3444A1DF41
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C13923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00C13A04
                                                                                                                                                                                                                                                  • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00C7C259
                                                                                                                                                                                                                                                  • KillTimer.USER32(?,00000001,?,?), ref: 00C7C261
                                                                                                                                                                                                                                                  • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00C7C270
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: IconNotifyShell_Timer$Kill
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3500052701-0
                                                                                                                                                                                                                                                  • Opcode ID: 03f207d1c40320cc032f36a4367a0fba689fe13d2f4a7f3a4cce07cc568e8add
                                                                                                                                                                                                                                                  • Instruction ID: 130ca4195e3b9d4ab25ee6042d334c64b3cedd9f1744e470f6f733bb32a7c1eb
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 03f207d1c40320cc032f36a4367a0fba689fe13d2f4a7f3a4cce07cc568e8add
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 66318170904344AFEB229B64D8D5BEABBEC9B06308F04449ED6AEA7242C7745A84CB51
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • CloseHandle.KERNELBASE(00000000,00000000,?,?,00C485CC,?,00CD8CC8,0000000C), ref: 00C48704
                                                                                                                                                                                                                                                  • GetLastError.KERNEL32(?,00C485CC,?,00CD8CC8,0000000C), ref: 00C4870E
                                                                                                                                                                                                                                                  • __dosmaperr.LIBCMT ref: 00C48739
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CloseErrorHandleLast__dosmaperr
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2583163307-0
                                                                                                                                                                                                                                                  • Opcode ID: 375b93e25a6b703c2776738894e5e3dcee0c766c239baaf777e0eb4359ef7af4
                                                                                                                                                                                                                                                  • Instruction ID: b26e2f88c076a3347e4d52ad880a107502cb51cd85bd1981d4b343f0c81cb6ef
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 375b93e25a6b703c2776738894e5e3dcee0c766c239baaf777e0eb4359ef7af4
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9C016D33A0566027D6A56734A885BFE77497B82B78F3A011DFC288F1E3DEB1CD859190
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • TranslateMessage.USER32(?), ref: 00C1DB7B
                                                                                                                                                                                                                                                  • DispatchMessageW.USER32(?), ref: 00C1DB89
                                                                                                                                                                                                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00C1DB9F
                                                                                                                                                                                                                                                  • Sleep.KERNELBASE(0000000A), ref: 00C1DBB1
                                                                                                                                                                                                                                                  • TranslateAcceleratorW.USER32(?,?,?), ref: 00C61CC9
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3288985973-0
                                                                                                                                                                                                                                                  • Opcode ID: 44d9869c4fb0ad9b4b55bcf2622a5a8deb523a8afeb63d1d5a13b601446c28af
                                                                                                                                                                                                                                                  • Instruction ID: 8ee26ac1fdd201ab73cb39d24733c9e22707c9b67f6f58a564d95cb1fff721e6
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 44d9869c4fb0ad9b4b55bcf2622a5a8deb523a8afeb63d1d5a13b601446c28af
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 93F03A306443809BEB308B608C89FEE73A8AB86311F144518EA1AC30C0DB30A588AB25
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • __Init_thread_footer.LIBCMT ref: 00C217F6
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Init_thread_footer
                                                                                                                                                                                                                                                  • String ID: CALL
                                                                                                                                                                                                                                                  • API String ID: 1385522511-4196123274
                                                                                                                                                                                                                                                  • Opcode ID: 00352594f8bcff1f4355eead3357d98d1cbbd7ddaf26c5e5e7a4e4f83984a938
                                                                                                                                                                                                                                                  • Instruction ID: 6d7006eb2a0b5f8b9113805a3ad949e9ec53b76c2c948e55d1779e5e2f368381
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 00352594f8bcff1f4355eead3357d98d1cbbd7ddaf26c5e5e7a4e4f83984a938
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6822CB706083519FC724DF15D480B2ABBF1BF95314F28896DF89A8B7A2D731E941DB82
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetOpenFileNameW.COMDLG32(?), ref: 00C52C8C
                                                                                                                                                                                                                                                    • Part of subcall function 00C13AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00C13A97,?,?,00C12E7F,?,?,?,00000000), ref: 00C13AC2
                                                                                                                                                                                                                                                    • Part of subcall function 00C12DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00C12DC4
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Name$Path$FileFullLongOpen
                                                                                                                                                                                                                                                  • String ID: X
                                                                                                                                                                                                                                                  • API String ID: 779396738-3081909835
                                                                                                                                                                                                                                                  • Opcode ID: 112ee4e29090af4ae7f986d891caa523b0dfc204c57f7261f92e2a804478a6b8
                                                                                                                                                                                                                                                  • Instruction ID: 7f55a86e3104a6232dceb9939514fc045fb130b1c26d3795573e90d29bace94b
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 112ee4e29090af4ae7f986d891caa523b0dfc204c57f7261f92e2a804478a6b8
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6421C670A002989BDF41DF94C8457EE7BF89F4A305F00405AE505A7341DBB45689EF61
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00C13908
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: IconNotifyShell_
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1144537725-0
                                                                                                                                                                                                                                                  • Opcode ID: c22f807251d8e2a25891ed5f7d9e36d08f4112c7ecb7fa61f19ac793e2c08f6e
                                                                                                                                                                                                                                                  • Instruction ID: 25d87affa4e93d937e67209b199a307d4bf01f4e4606dc42664de682d9d818f1
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c22f807251d8e2a25891ed5f7d9e36d08f4112c7ecb7fa61f19ac793e2c08f6e
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: BE31E670504341CFE720DF24D8847DBBBE8FB4A718F04092EF99987290E771AA84DB52
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • timeGetTime.WINMM ref: 00C2F661
                                                                                                                                                                                                                                                    • Part of subcall function 00C1D730: GetInputState.USER32 ref: 00C1D807
                                                                                                                                                                                                                                                  • Sleep.KERNEL32(00000000), ref: 00C6F2DE
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: InputSleepStateTimetime
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 4149333218-0
                                                                                                                                                                                                                                                  • Opcode ID: 01b0ea275678443075e78e5c11c9af32265febc7d06f43cabe2581ad09f1c771
                                                                                                                                                                                                                                                  • Instruction ID: b0e031e86ad4431ba98504f4ae0300223adfd9f4cb39ef23a68e1dd2deaa5141
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 01b0ea275678443075e78e5c11c9af32265febc7d06f43cabe2581ad09f1c771
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 67F08C312402159FD310EF69E489BAAB7E9EF46760F000029F85AC72A0EB70AC41DF90
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C14E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00C14EDD,?,00CE1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00C14E9C
                                                                                                                                                                                                                                                    • Part of subcall function 00C14E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00C14EAE
                                                                                                                                                                                                                                                    • Part of subcall function 00C14E90: FreeLibrary.KERNEL32(00000000,?,?,00C14EDD,?,00CE1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00C14EC0
                                                                                                                                                                                                                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00CE1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00C14EFD
                                                                                                                                                                                                                                                    • Part of subcall function 00C14E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00C53CDE,?,00CE1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00C14E62
                                                                                                                                                                                                                                                    • Part of subcall function 00C14E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00C14E74
                                                                                                                                                                                                                                                    • Part of subcall function 00C14E59: FreeLibrary.KERNEL32(00000000,?,?,00C53CDE,?,00CE1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00C14E87
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Library$Load$AddressFreeProc
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2632591731-0
                                                                                                                                                                                                                                                  • Opcode ID: 9d61baab3f7f2ed2ee4a07f0540508bd6b50f2519abf4072cc600783daa51e3f
                                                                                                                                                                                                                                                  • Instruction ID: e50388d7b155e8791df8578f142b65119f68828a21222c94b3802273f8f76944
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9d61baab3f7f2ed2ee4a07f0540508bd6b50f2519abf4072cc600783daa51e3f
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0911E732610205ABCF18BBA4DC02FED77A59F82711F20842DF552AA2C1DE719A85F750
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: __wsopen_s
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3347428461-0
                                                                                                                                                                                                                                                  • Opcode ID: ef302413b9c89b815779d694f470e37c44befb35b915755b0bfaa517f4b186e9
                                                                                                                                                                                                                                                  • Instruction ID: e4ee51ea8f577b13497d7c8538df9fa178488406d564013796df84fe08c676ad
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: ef302413b9c89b815779d694f470e37c44befb35b915755b0bfaa517f4b186e9
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: E911187590420AAFCB05DF58E941A9E7BF5FF48314F144059FC18AB312DA31DA15CBA5
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C44C7D: RtlAllocateHeap.NTDLL(00000008,00C11129,00000000,?,00C42E29,00000001,00000364,?,?,?,00C3F2DE,00C43863,00CE1444,?,00C2FDF5,?), ref: 00C44CBE
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C4506C
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: AllocateHeap_free
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 614378929-0
                                                                                                                                                                                                                                                  • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                                                                                                                                                                                                  • Instruction ID: f427180be7e5386ebbdd3bd0223b2524740e8d6c01f8ccee54736913b91b2948
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 900145766047056BE3318F69D881A9AFBEDFB89370F65062DF194832C1EB30A905C7B4
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                                  • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                                                                                                                                                                                                  • Instruction ID: e4daa1e4997b67118895c72fbf7925137d7107ec55e65598de56941f08b96584
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6AF0F432930A18D6D6313A6A9C06B9A33A8AF62335F100719F821921D2CB70D906A7A5
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • RtlAllocateHeap.NTDLL(00000008,00C11129,00000000,?,00C42E29,00000001,00000364,?,?,?,00C3F2DE,00C43863,00CE1444,?,00C2FDF5,?), ref: 00C44CBE
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: AllocateHeap
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1279760036-0
                                                                                                                                                                                                                                                  • Opcode ID: dac041c64f9ecdb049d72856b26171362e2b683e8575ce2583d614211ff70a6e
                                                                                                                                                                                                                                                  • Instruction ID: 8840b629383fb421074363b0db30c803b1393e076dc14daa8d8f96fcb6c73c6e
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: dac041c64f9ecdb049d72856b26171362e2b683e8575ce2583d614211ff70a6e
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0CF0E93160222467DB295F66AC85B5F3788BF417A1F3C4115BC25AB190CA30D90156E0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • RtlAllocateHeap.NTDLL(00000000,?,00CE1444,?,00C2FDF5,?,?,00C1A976,00000010,00CE1440,00C113FC,?,00C113C6,?,00C11129), ref: 00C43852
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: AllocateHeap
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1279760036-0
                                                                                                                                                                                                                                                  • Opcode ID: 85c983a9527dfcf24be8770c592331207b472f57b958d932958a64eddcbec968
                                                                                                                                                                                                                                                  • Instruction ID: ced4b39648fdbfd382e93790be35a42c87ee79a31115ecf0153b88ded9b92432
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 85c983a9527dfcf24be8770c592331207b472f57b958d932958a64eddcbec968
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6CE022312002A4AAE7312AB79C00B9FF749BFC27B4F090023BC24964D0DB21EF0196F0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • FreeLibrary.KERNEL32(?,?,00CE1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00C14F6D
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: FreeLibrary
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3664257935-0
                                                                                                                                                                                                                                                  • Opcode ID: c80adddd118dc1b783cbf1b1b9de7da262a051322131f519673ead2c08bad2aa
                                                                                                                                                                                                                                                  • Instruction ID: 804b561c50bec8bd16c1895399c12b3c0bb7412db046869cf437cc266b45d9a6
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c80adddd118dc1b783cbf1b1b9de7da262a051322131f519673ead2c08bad2aa
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: FBF0A070105301CFCB388FA1D490896B7F0EF02319310897EE1EA87610C7319885EF00
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • IsWindow.USER32(00000000), ref: 00CA2A66
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Window
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2353593579-0
                                                                                                                                                                                                                                                  • Opcode ID: 416a6dcab25c1bb98c53320a869fce18fce1fa97e52e378a2565051dcf02b34f
                                                                                                                                                                                                                                                  • Instruction ID: d941e709da358e6852c524d3eef0fb7307b08f38ea9b9e875d3bccd6095bcd3f
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 416a6dcab25c1bb98c53320a869fce18fce1fa97e52e378a2565051dcf02b34f
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: E7E04F36350126AEC754EA35DC80AFE735CEB51399B104536BC2AD2140DB309E95B6A0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00C1314E
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: IconNotifyShell_
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1144537725-0
                                                                                                                                                                                                                                                  • Opcode ID: 66fcccdb41c59ea66619ad396c4be33b5b2633f09f3db17dc5ecbe48e58e5733
                                                                                                                                                                                                                                                  • Instruction ID: 4750504fba3220fde3fd9867b64687fe13fd3a6e1280c266c22544404a5c9c3a
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 66fcccdb41c59ea66619ad396c4be33b5b2633f09f3db17dc5ecbe48e58e5733
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 79F037709143549FEB52DB24DC857DD7BBCA70570CF0400E5A54897191D77457D8CF51
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00C12DC4
                                                                                                                                                                                                                                                    • Part of subcall function 00C16B57: _wcslen.LIBCMT ref: 00C16B6A
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: LongNamePath_wcslen
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 541455249-0
                                                                                                                                                                                                                                                  • Opcode ID: 0c6625b0c231b56218a6c8fd57c5693487d7bbc2f7dc14ffcd092ca3902fe1af
                                                                                                                                                                                                                                                  • Instruction ID: 3d100ef68f3ca39f8b7477208162991d90742ff802e8d9be7e25d2b6853f07f5
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0c6625b0c231b56218a6c8fd57c5693487d7bbc2f7dc14ffcd092ca3902fe1af
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 31E0C276A042245BCB20E6989C0AFEA77EDDFC9790F0501B1FD09E7248DA60ADC49690
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C13837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00C13908
                                                                                                                                                                                                                                                    • Part of subcall function 00C1D730: GetInputState.USER32 ref: 00C1D807
                                                                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00C12B6B
                                                                                                                                                                                                                                                    • Part of subcall function 00C130F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 00C1314E
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3667716007-0
                                                                                                                                                                                                                                                  • Opcode ID: 3b9533b532a987c4f41e1e7c4b1a538732baa5654081178cef343ea6c7544015
                                                                                                                                                                                                                                                  • Instruction ID: b3e6a785c25b9396e3a64328fdc571ab5ab12e05430ffaf90ac3e0c87b232de3
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3b9533b532a987c4f41e1e7c4b1a538732baa5654081178cef343ea6c7544015
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: EEE026313042C407CA04BB30A8526EDA3998BD3319F00043EF143472E2CE308AD57352
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • CreateFileW.KERNELBASE(00000000,00000000,?,00C50704,?,?,00000000,?,00C50704,00000000,0000000C), ref: 00C503B7
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CreateFile
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 823142352-0
                                                                                                                                                                                                                                                  • Opcode ID: 8678e3a9d1b62abc64c9f296d45c58f3279465bd3b52d68aa2d1e5ec9849570e
                                                                                                                                                                                                                                                  • Instruction ID: 3d89e53b540e66d35c750de6e90375187ba107a42f7e33baa0d810f9b2d833b0
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8678e3a9d1b62abc64c9f296d45c58f3279465bd3b52d68aa2d1e5ec9849570e
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: EDD06C3214010DBBDF028F84DD46EDE3BAAFB48714F014000BE1856020C736E821AB90
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00C11CBC
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: InfoParametersSystem
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3098949447-0
                                                                                                                                                                                                                                                  • Opcode ID: 3d67ceb70d14e527785581e1b9f84decc9b200862f71dfa49b701ca1146745cc
                                                                                                                                                                                                                                                  • Instruction ID: c838fcc5682a6e38b41c8ac5e908f5553f484c40a0e506ed8389af4a87ac3e93
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3d67ceb70d14e527785581e1b9f84decc9b200862f71dfa49b701ca1146745cc
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: D6C09B352803449FF2144B80BDCAF287754A348B04F444001F6095D5F3C7B11820F650
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C29BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00C29BB2
                                                                                                                                                                                                                                                  • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00CA961A
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00CA965B
                                                                                                                                                                                                                                                  • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00CA969F
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00CA96C9
                                                                                                                                                                                                                                                  • SendMessageW.USER32 ref: 00CA96F2
                                                                                                                                                                                                                                                  • GetKeyState.USER32(00000011), ref: 00CA978B
                                                                                                                                                                                                                                                  • GetKeyState.USER32(00000009), ref: 00CA9798
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00CA97AE
                                                                                                                                                                                                                                                  • GetKeyState.USER32(00000010), ref: 00CA97B8
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00CA97E9
                                                                                                                                                                                                                                                  • SendMessageW.USER32 ref: 00CA9810
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001030,?,00CA7E95), ref: 00CA9918
                                                                                                                                                                                                                                                  • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00CA992E
                                                                                                                                                                                                                                                  • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00CA9941
                                                                                                                                                                                                                                                  • SetCapture.USER32(?), ref: 00CA994A
                                                                                                                                                                                                                                                  • ClientToScreen.USER32(?,?), ref: 00CA99AF
                                                                                                                                                                                                                                                  • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00CA99BC
                                                                                                                                                                                                                                                  • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00CA99D6
                                                                                                                                                                                                                                                  • ReleaseCapture.USER32 ref: 00CA99E1
                                                                                                                                                                                                                                                  • GetCursorPos.USER32(?), ref: 00CA9A19
                                                                                                                                                                                                                                                  • ScreenToClient.USER32(?,?), ref: 00CA9A26
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 00CA9A80
                                                                                                                                                                                                                                                  • SendMessageW.USER32 ref: 00CA9AAE
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00CA9AEB
                                                                                                                                                                                                                                                  • SendMessageW.USER32 ref: 00CA9B1A
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00CA9B3B
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00CA9B4A
                                                                                                                                                                                                                                                  • GetCursorPos.USER32(?), ref: 00CA9B68
                                                                                                                                                                                                                                                  • ScreenToClient.USER32(?,?), ref: 00CA9B75
                                                                                                                                                                                                                                                  • GetParent.USER32(?), ref: 00CA9B93
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 00CA9BFA
                                                                                                                                                                                                                                                  • SendMessageW.USER32 ref: 00CA9C2B
                                                                                                                                                                                                                                                  • ClientToScreen.USER32(?,?), ref: 00CA9C84
                                                                                                                                                                                                                                                  • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00CA9CB4
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00CA9CDE
                                                                                                                                                                                                                                                  • SendMessageW.USER32 ref: 00CA9D01
                                                                                                                                                                                                                                                  • ClientToScreen.USER32(?,?), ref: 00CA9D4E
                                                                                                                                                                                                                                                  • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00CA9D82
                                                                                                                                                                                                                                                    • Part of subcall function 00C29944: GetWindowLongW.USER32(?,000000EB), ref: 00C29952
                                                                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00CA9E05
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                                                                                                                                                                                                                  • String ID: @GUI_DRAGID$F
                                                                                                                                                                                                                                                  • API String ID: 3429851547-4164748364
                                                                                                                                                                                                                                                  • Opcode ID: f7dc11941d8284e1bffe9e5f3ec71ce59d4e1047926dafca464021488d40499b
                                                                                                                                                                                                                                                  • Instruction ID: d303cc1e76eb2ab5ab980daf74531a1f711105e4c26a8a7512629bc0a1a2a662
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: f7dc11941d8284e1bffe9e5f3ec71ce59d4e1047926dafca464021488d40499b
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8842AE34604642AFDB24CF24CC85BAABBF5FF4A328F140619FA69872A1D731D960DF51
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 00CA48F3
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00CA4908
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00CA4927
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 00CA494B
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00CA495C
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 00CA497B
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 00CA49AE
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 00CA49D4
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00CA4A0F
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00CA4A56
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00CA4A7E
                                                                                                                                                                                                                                                  • IsMenu.USER32(?), ref: 00CA4A97
                                                                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00CA4AF2
                                                                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00CA4B20
                                                                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00CA4B94
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00CA4BE3
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00CA4C82
                                                                                                                                                                                                                                                  • wsprintfW.USER32 ref: 00CA4CAE
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00CA4CC9
                                                                                                                                                                                                                                                  • GetWindowTextW.USER32(?,00000000,00000001), ref: 00CA4CF1
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00CA4D13
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00CA4D33
                                                                                                                                                                                                                                                  • GetWindowTextW.USER32(?,00000000,00000001), ref: 00CA4D5A
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                                                                                                                                                                                                                  • String ID: %d/%02d/%02d
                                                                                                                                                                                                                                                  • API String ID: 4054740463-328681919
                                                                                                                                                                                                                                                  • Opcode ID: 6cd2cc6d5727b9f8cf4067655eb6e82f5599aef9870d8b5aa85f9aaf383a99d2
                                                                                                                                                                                                                                                  • Instruction ID: e9447693c7b19b627af0f9c804cd16e079563ffe6c411d6af2d604d0cd925304
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6cd2cc6d5727b9f8cf4067655eb6e82f5599aef9870d8b5aa85f9aaf383a99d2
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: E4121631500215AFEB298F64DC49FAE7BF8EF86318F104129F525EB1E1DBB49A41CB50
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 00C2F998
                                                                                                                                                                                                                                                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00C6F474
                                                                                                                                                                                                                                                  • IsIconic.USER32(00000000), ref: 00C6F47D
                                                                                                                                                                                                                                                  • ShowWindow.USER32(00000000,00000009), ref: 00C6F48A
                                                                                                                                                                                                                                                  • SetForegroundWindow.USER32(00000000), ref: 00C6F494
                                                                                                                                                                                                                                                  • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00C6F4AA
                                                                                                                                                                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00C6F4B1
                                                                                                                                                                                                                                                  • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00C6F4BD
                                                                                                                                                                                                                                                  • AttachThreadInput.USER32(?,00000000,00000001), ref: 00C6F4CE
                                                                                                                                                                                                                                                  • AttachThreadInput.USER32(?,00000000,00000001), ref: 00C6F4D6
                                                                                                                                                                                                                                                  • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 00C6F4DE
                                                                                                                                                                                                                                                  • SetForegroundWindow.USER32(00000000), ref: 00C6F4E1
                                                                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 00C6F4F6
                                                                                                                                                                                                                                                  • keybd_event.USER32(00000012,00000000), ref: 00C6F501
                                                                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 00C6F50B
                                                                                                                                                                                                                                                  • keybd_event.USER32(00000012,00000000), ref: 00C6F510
                                                                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 00C6F519
                                                                                                                                                                                                                                                  • keybd_event.USER32(00000012,00000000), ref: 00C6F51E
                                                                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 00C6F528
                                                                                                                                                                                                                                                  • keybd_event.USER32(00000012,00000000), ref: 00C6F52D
                                                                                                                                                                                                                                                  • SetForegroundWindow.USER32(00000000), ref: 00C6F530
                                                                                                                                                                                                                                                  • AttachThreadInput.USER32(?,000000FF,00000000), ref: 00C6F557
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                                                                                                                                                                                                  • String ID: Shell_TrayWnd
                                                                                                                                                                                                                                                  • API String ID: 4125248594-2988720461
                                                                                                                                                                                                                                                  • Opcode ID: e35c545211c605e56ddc1407cd67be39b372d3167805377b7615c36675da43b9
                                                                                                                                                                                                                                                  • Instruction ID: 923f81d4c0974491dce129f99dc01ca37a52a3ed33cf28bcc7bc4a06abf24b69
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e35c545211c605e56ddc1407cd67be39b372d3167805377b7615c36675da43b9
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5F313271A40218BFEB316BB55C8AFBF7E7CEB45B54F100069FA01E71D1CAB15D11AA60
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C716C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00C7170D
                                                                                                                                                                                                                                                    • Part of subcall function 00C716C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00C7173A
                                                                                                                                                                                                                                                    • Part of subcall function 00C716C3: GetLastError.KERNEL32 ref: 00C7174A
                                                                                                                                                                                                                                                  • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00C71286
                                                                                                                                                                                                                                                  • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00C712A8
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?), ref: 00C712B9
                                                                                                                                                                                                                                                  • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00C712D1
                                                                                                                                                                                                                                                  • GetProcessWindowStation.USER32 ref: 00C712EA
                                                                                                                                                                                                                                                  • SetProcessWindowStation.USER32(00000000), ref: 00C712F4
                                                                                                                                                                                                                                                  • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00C71310
                                                                                                                                                                                                                                                    • Part of subcall function 00C710BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00C711FC), ref: 00C710D4
                                                                                                                                                                                                                                                    • Part of subcall function 00C710BF: CloseHandle.KERNEL32(?,?,00C711FC), ref: 00C710E9
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                                                                                                                                                                                                                  • String ID: $default$winsta0
                                                                                                                                                                                                                                                  • API String ID: 22674027-1027155976
                                                                                                                                                                                                                                                  • Opcode ID: 985105c6cb3d6c159a304d7bff137729aa669443471026429f1a86296705eaee
                                                                                                                                                                                                                                                  • Instruction ID: b830dcd230acb9578e5415b3137293b6edf47fa91ccd28ca38c50db1c3b290b1
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 985105c6cb3d6c159a304d7bff137729aa669443471026429f1a86296705eaee
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5881A171900209AFDF219FA9DC49FEE7BB9EF05704F188129FD28E61A0D7348A44CB60
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C710F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00C71114
                                                                                                                                                                                                                                                    • Part of subcall function 00C710F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00C70B9B,?,?,?), ref: 00C71120
                                                                                                                                                                                                                                                    • Part of subcall function 00C710F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00C70B9B,?,?,?), ref: 00C7112F
                                                                                                                                                                                                                                                    • Part of subcall function 00C710F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00C70B9B,?,?,?), ref: 00C71136
                                                                                                                                                                                                                                                    • Part of subcall function 00C710F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00C7114D
                                                                                                                                                                                                                                                  • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00C70BCC
                                                                                                                                                                                                                                                  • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00C70C00
                                                                                                                                                                                                                                                  • GetLengthSid.ADVAPI32(?), ref: 00C70C17
                                                                                                                                                                                                                                                  • GetAce.ADVAPI32(?,00000000,?), ref: 00C70C51
                                                                                                                                                                                                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00C70C6D
                                                                                                                                                                                                                                                  • GetLengthSid.ADVAPI32(?), ref: 00C70C84
                                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00C70C8C
                                                                                                                                                                                                                                                  • HeapAlloc.KERNEL32(00000000), ref: 00C70C93
                                                                                                                                                                                                                                                  • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00C70CB4
                                                                                                                                                                                                                                                  • CopySid.ADVAPI32(00000000), ref: 00C70CBB
                                                                                                                                                                                                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00C70CEA
                                                                                                                                                                                                                                                  • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00C70D0C
                                                                                                                                                                                                                                                  • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00C70D1E
                                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00C70D45
                                                                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00C70D4C
                                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00C70D55
                                                                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00C70D5C
                                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00C70D65
                                                                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00C70D6C
                                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00C70D78
                                                                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00C70D7F
                                                                                                                                                                                                                                                    • Part of subcall function 00C71193: GetProcessHeap.KERNEL32(00000008,00C70BB1,?,00000000,?,00C70BB1,?), ref: 00C711A1
                                                                                                                                                                                                                                                    • Part of subcall function 00C71193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00C70BB1,?), ref: 00C711A8
                                                                                                                                                                                                                                                    • Part of subcall function 00C71193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00C70BB1,?), ref: 00C711B7
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 4175595110-0
                                                                                                                                                                                                                                                  • Opcode ID: 32623099828cf343ad759f6529ff5581a51bbaa13d6ad15ad31d3a161c0c6b35
                                                                                                                                                                                                                                                  • Instruction ID: 9b3526b69e50e148c8fc96943df08977017a289bd129e5063c991da881bc2f0f
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 32623099828cf343ad759f6529ff5581a51bbaa13d6ad15ad31d3a161c0c6b35
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3F716D71A0020AEBDF10DFA5DC84FEEBBB8BF15304F148519F929A7291D771AA05CB60
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • OpenClipboard.USER32(00CACC08), ref: 00C8EB29
                                                                                                                                                                                                                                                  • IsClipboardFormatAvailable.USER32(0000000D), ref: 00C8EB37
                                                                                                                                                                                                                                                  • GetClipboardData.USER32(0000000D), ref: 00C8EB43
                                                                                                                                                                                                                                                  • CloseClipboard.USER32 ref: 00C8EB4F
                                                                                                                                                                                                                                                  • GlobalLock.KERNEL32(00000000), ref: 00C8EB87
                                                                                                                                                                                                                                                  • CloseClipboard.USER32 ref: 00C8EB91
                                                                                                                                                                                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00C8EBBC
                                                                                                                                                                                                                                                  • IsClipboardFormatAvailable.USER32(00000001), ref: 00C8EBC9
                                                                                                                                                                                                                                                  • GetClipboardData.USER32(00000001), ref: 00C8EBD1
                                                                                                                                                                                                                                                  • GlobalLock.KERNEL32(00000000), ref: 00C8EBE2
                                                                                                                                                                                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00C8EC22
                                                                                                                                                                                                                                                  • IsClipboardFormatAvailable.USER32(0000000F), ref: 00C8EC38
                                                                                                                                                                                                                                                  • GetClipboardData.USER32(0000000F), ref: 00C8EC44
                                                                                                                                                                                                                                                  • GlobalLock.KERNEL32(00000000), ref: 00C8EC55
                                                                                                                                                                                                                                                  • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00C8EC77
                                                                                                                                                                                                                                                  • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00C8EC94
                                                                                                                                                                                                                                                  • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00C8ECD2
                                                                                                                                                                                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00C8ECF3
                                                                                                                                                                                                                                                  • CountClipboardFormats.USER32 ref: 00C8ED14
                                                                                                                                                                                                                                                  • CloseClipboard.USER32 ref: 00C8ED59
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 420908878-0
                                                                                                                                                                                                                                                  • Opcode ID: ab582d547fa1a0e494a7cf840864fb9bd43abfa697df63c013885e150f8d67ac
                                                                                                                                                                                                                                                  • Instruction ID: b3054bbf44e5fb664a5d2af0fd31b6c5089bafd1c599c9345f04ff831cb53158
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: ab582d547fa1a0e494a7cf840864fb9bd43abfa697df63c013885e150f8d67ac
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8861BF342042019FD300EF24D895F7EB7E4EF86718F144519F466972A2DB31EE4ADBA6
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00C869BE
                                                                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00C86A12
                                                                                                                                                                                                                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00C86A4E
                                                                                                                                                                                                                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00C86A75
                                                                                                                                                                                                                                                    • Part of subcall function 00C19CB3: _wcslen.LIBCMT ref: 00C19CBD
                                                                                                                                                                                                                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 00C86AB2
                                                                                                                                                                                                                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 00C86ADF
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                                                                                                                                                                                                                  • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                                                                                                                                                                                                                  • API String ID: 3830820486-3289030164
                                                                                                                                                                                                                                                  • Opcode ID: 36488f5929d42c4ba16e75b520ea4266a0c9476be346b227772453784affd4c1
                                                                                                                                                                                                                                                  • Instruction ID: c16cc7276f3858ae5a934261cd0b74fa9111227c9dea95d06642a1db20d35975
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 36488f5929d42c4ba16e75b520ea4266a0c9476be346b227772453784affd4c1
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1DD15E72508300AFC314EBA4D891EAFB7ECAF89704F04492DF595C7291EB74DA45EB62
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00C89663
                                                                                                                                                                                                                                                  • GetFileAttributesW.KERNEL32(?), ref: 00C896A1
                                                                                                                                                                                                                                                  • SetFileAttributesW.KERNEL32(?,?), ref: 00C896BB
                                                                                                                                                                                                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00C896D3
                                                                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00C896DE
                                                                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(*.*,?), ref: 00C896FA
                                                                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00C8974A
                                                                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(00CD6B7C), ref: 00C89768
                                                                                                                                                                                                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 00C89772
                                                                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00C8977F
                                                                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00C8978F
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                                                                                                                                                                                                  • String ID: *.*
                                                                                                                                                                                                                                                  • API String ID: 1409584000-438819550
                                                                                                                                                                                                                                                  • Opcode ID: 2efca4a01feb5f7e0a26a879f5e22daff292350ba86c56e87fa5db827f0d1363
                                                                                                                                                                                                                                                  • Instruction ID: 5864703d5ce4aeb124cca40ab01f5983de2ac4ca1127a3afc97061857f7e6aff
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2efca4a01feb5f7e0a26a879f5e22daff292350ba86c56e87fa5db827f0d1363
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4531B0325012197ADB14BFB4DC49BEE77ACDF4A328F184166F915E31A0EB34DE408B58
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00C897BE
                                                                                                                                                                                                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00C89819
                                                                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00C89824
                                                                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(*.*,?), ref: 00C89840
                                                                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00C89890
                                                                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(00CD6B7C), ref: 00C898AE
                                                                                                                                                                                                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 00C898B8
                                                                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00C898C5
                                                                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00C898D5
                                                                                                                                                                                                                                                    • Part of subcall function 00C7DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00C7DB00
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                                                                                                                                                                                                  • String ID: *.*
                                                                                                                                                                                                                                                  • API String ID: 2640511053-438819550
                                                                                                                                                                                                                                                  • Opcode ID: 9e22c776942402643d04734d45fce189ca331edd2803b126a9885d47d9fdf7f5
                                                                                                                                                                                                                                                  • Instruction ID: 9f4eaa2f47800a5430fee4fd252755d82378d8c59968c8c5712c003688f9528c
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9e22c776942402643d04734d45fce189ca331edd2803b126a9885d47d9fdf7f5
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5731923150161A7ADF14BFA4DC48BEE77ACDF06328F184166E924A31E0DB31DE44DB68
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C9C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C9B6AE,?,?), ref: 00C9C9B5
                                                                                                                                                                                                                                                    • Part of subcall function 00C9C998: _wcslen.LIBCMT ref: 00C9C9F1
                                                                                                                                                                                                                                                    • Part of subcall function 00C9C998: _wcslen.LIBCMT ref: 00C9CA68
                                                                                                                                                                                                                                                    • Part of subcall function 00C9C998: _wcslen.LIBCMT ref: 00C9CA9E
                                                                                                                                                                                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C9BF3E
                                                                                                                                                                                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 00C9BFA9
                                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00C9BFCD
                                                                                                                                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00C9C02C
                                                                                                                                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00C9C0E7
                                                                                                                                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00C9C154
                                                                                                                                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00C9C1E9
                                                                                                                                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 00C9C23A
                                                                                                                                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00C9C2E3
                                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00C9C382
                                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00C9C38F
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3102970594-0
                                                                                                                                                                                                                                                  • Opcode ID: 2374647878dac4494504714f509c1e96b1ab71edf78f641701dfe87b62b9a594
                                                                                                                                                                                                                                                  • Instruction ID: f4bd17a215c3266d1fe7a5995c719c6fce9c3b095a8365424a16c42c18d4ee11
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2374647878dac4494504714f509c1e96b1ab71edf78f641701dfe87b62b9a594
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4E024C71604200AFDB14CF28C8D5E6ABBE5EF49308F18849DF85ACB2A2D731ED45DB51
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetLocalTime.KERNEL32(?), ref: 00C88257
                                                                                                                                                                                                                                                  • SystemTimeToFileTime.KERNEL32(?,?), ref: 00C88267
                                                                                                                                                                                                                                                  • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00C88273
                                                                                                                                                                                                                                                  • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00C88310
                                                                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00C88324
                                                                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00C88356
                                                                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00C8838C
                                                                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00C88395
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CurrentDirectoryTime$File$Local$System
                                                                                                                                                                                                                                                  • String ID: *.*
                                                                                                                                                                                                                                                  • API String ID: 1464919966-438819550
                                                                                                                                                                                                                                                  • Opcode ID: 57004ca5c9f19fbe13cf5d8a875840798b9e97350820e2e10f749e9b1c919864
                                                                                                                                                                                                                                                  • Instruction ID: 00dd1889fdd3c7ef77a8edcd24473cfd6a4942c0c2674699fc445a1bec6809a8
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 57004ca5c9f19fbe13cf5d8a875840798b9e97350820e2e10f749e9b1c919864
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3C61AF725043059FCB10EF64C884AAEB3E8FF89314F44891EF999C7251EB31E949DB96
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C13AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00C13A97,?,?,00C12E7F,?,?,?,00000000), ref: 00C13AC2
                                                                                                                                                                                                                                                    • Part of subcall function 00C7E199: GetFileAttributesW.KERNEL32(?,00C7CF95), ref: 00C7E19A
                                                                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00C7D122
                                                                                                                                                                                                                                                  • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00C7D1DD
                                                                                                                                                                                                                                                  • MoveFileW.KERNEL32(?,?), ref: 00C7D1F0
                                                                                                                                                                                                                                                  • DeleteFileW.KERNEL32(?,?,?,?), ref: 00C7D20D
                                                                                                                                                                                                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 00C7D237
                                                                                                                                                                                                                                                    • Part of subcall function 00C7D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00C7D21C,?,?), ref: 00C7D2B2
                                                                                                                                                                                                                                                  • FindClose.KERNEL32(00000000,?,?,?), ref: 00C7D253
                                                                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00C7D264
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                                                                                                                                                                                                                  • String ID: \*.*
                                                                                                                                                                                                                                                  • API String ID: 1946585618-1173974218
                                                                                                                                                                                                                                                  • Opcode ID: 06fe90a32f38850a1b4add2eb729cca87ce5ab78a5c8479e6f0d2c06ca34ea91
                                                                                                                                                                                                                                                  • Instruction ID: 346603091191f4baccfbad29ac0497b520a665c36da269716e70684a4875cb74
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 06fe90a32f38850a1b4add2eb729cca87ce5ab78a5c8479e6f0d2c06ca34ea91
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: C7619F31C0114D9FCF05EBE0C992AEDB7B5AF56304F648165E41A771A2EB306F4AEB60
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1737998785-0
                                                                                                                                                                                                                                                  • Opcode ID: f5f17989e915222f1495c918e21ceef1ac91ef38faa81022fbd1d9311da75b0d
                                                                                                                                                                                                                                                  • Instruction ID: ae2a4e78ac24e53f7135333d19a614ac30d6e6a7c44fcfc904dd62565cc66dd7
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: f5f17989e915222f1495c918e21ceef1ac91ef38faa81022fbd1d9311da75b0d
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 59418B35204611AFE720EF15D888B59BBE5EF4532CF14C099F4298B7A2C735ED42CB94
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C716C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00C7170D
                                                                                                                                                                                                                                                    • Part of subcall function 00C716C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00C7173A
                                                                                                                                                                                                                                                    • Part of subcall function 00C716C3: GetLastError.KERNEL32 ref: 00C7174A
                                                                                                                                                                                                                                                  • ExitWindowsEx.USER32(?,00000000), ref: 00C7E932
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                                                                                                                                                                                  • String ID: $ $@$SeShutdownPrivilege
                                                                                                                                                                                                                                                  • API String ID: 2234035333-3163812486
                                                                                                                                                                                                                                                  • Opcode ID: 2cbe07943716d6222a9297ce9e09c8ff6081105087fe7c9f8e64ce2c456a3288
                                                                                                                                                                                                                                                  • Instruction ID: 5ba57ae9c2c6692cac9b92d5975b65f7302b6dba7432f4e8264bb98a3cd179b1
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2cbe07943716d6222a9297ce9e09c8ff6081105087fe7c9f8e64ce2c456a3288
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3A014933610211AFEB6426B99CCAFFF725C9708754F18C462FE1BE31D1D6A05D409290
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00C91276
                                                                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 00C91283
                                                                                                                                                                                                                                                  • bind.WSOCK32(00000000,?,00000010), ref: 00C912BA
                                                                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 00C912C5
                                                                                                                                                                                                                                                  • closesocket.WSOCK32(00000000), ref: 00C912F4
                                                                                                                                                                                                                                                  • listen.WSOCK32(00000000,00000005), ref: 00C91303
                                                                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 00C9130D
                                                                                                                                                                                                                                                  • closesocket.WSOCK32(00000000), ref: 00C9133C
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ErrorLast$closesocket$bindlistensocket
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 540024437-0
                                                                                                                                                                                                                                                  • Opcode ID: 4277d29b679ae937f560bda7b154a6af7dd75b9707a6b951ebe5d2a7c6d4eb67
                                                                                                                                                                                                                                                  • Instruction ID: 50d5365d644ff7cd108697e16cc3d1b0be8b01e63d005c3da042485e372f8447
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4277d29b679ae937f560bda7b154a6af7dd75b9707a6b951ebe5d2a7c6d4eb67
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: CD4173316001419FDB10EF64C4C9B69BBE5BF46318F188198E8669F2D2C775ED81CBE1
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C13AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00C13A97,?,?,00C12E7F,?,?,?,00000000), ref: 00C13AC2
                                                                                                                                                                                                                                                    • Part of subcall function 00C7E199: GetFileAttributesW.KERNEL32(?,00C7CF95), ref: 00C7E19A
                                                                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00C7D420
                                                                                                                                                                                                                                                  • DeleteFileW.KERNEL32(?,?,?,?), ref: 00C7D470
                                                                                                                                                                                                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 00C7D481
                                                                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00C7D498
                                                                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00C7D4A1
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                                                                                                                                                                                                  • String ID: \*.*
                                                                                                                                                                                                                                                  • API String ID: 2649000838-1173974218
                                                                                                                                                                                                                                                  • Opcode ID: 78018e081f179cf251ed44304bced2f69ccb3383b7401049a7fa3d7e9c24060b
                                                                                                                                                                                                                                                  • Instruction ID: 6842e7528b7086087198afd85b1549ff7594323606f316ccdfc8776edc8dd0ef
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 78018e081f179cf251ed44304bced2f69ccb3383b7401049a7fa3d7e9c24060b
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 223182710093419FC300EF64C8959EFB7E8BE92314F448A1DF4E6531A1EB30AA49EB63
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: __floor_pentium4
                                                                                                                                                                                                                                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                                                                                                                                                                  • API String ID: 4168288129-2761157908
                                                                                                                                                                                                                                                  • Opcode ID: 410ef73c84bd9a56208c392662da350cc741968523cac10b96c0a74efe3d7c87
                                                                                                                                                                                                                                                  • Instruction ID: a83fd9730878d486a1dc7fca97311a091d81e5397e0b51e8a639bc602c3393c2
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 410ef73c84bd9a56208c392662da350cc741968523cac10b96c0a74efe3d7c87
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A4C23A72E046288FDB25CE28DD407EAB7B5FB49315F1541EAD85DE7280E774AE828F40
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C864DC
                                                                                                                                                                                                                                                  • CoInitialize.OLE32(00000000), ref: 00C86639
                                                                                                                                                                                                                                                  • CoCreateInstance.OLE32(00CAFCF8,00000000,00000001,00CAFB68,?), ref: 00C86650
                                                                                                                                                                                                                                                  • CoUninitialize.OLE32 ref: 00C868D4
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                                                                                                                                                                                                  • String ID: .lnk
                                                                                                                                                                                                                                                  • API String ID: 886957087-24824748
                                                                                                                                                                                                                                                  • Opcode ID: 1ef4eff4fd1909fe1d7694d4576304a2f4313b8595020a7192cfcadd3a52f7b0
                                                                                                                                                                                                                                                  • Instruction ID: a1ee4467611bf2f71af9663140abd31a7e1f63a0ece63222326b3847c22105be
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1ef4eff4fd1909fe1d7694d4576304a2f4313b8595020a7192cfcadd3a52f7b0
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2AD14B71508301AFD304EF64C891AABB7E8FF99708F00496DF5958B291DB70EE46DB92
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetForegroundWindow.USER32(?,?,00000000), ref: 00C922E8
                                                                                                                                                                                                                                                    • Part of subcall function 00C8E4EC: GetWindowRect.USER32(?,?), ref: 00C8E504
                                                                                                                                                                                                                                                  • GetDesktopWindow.USER32 ref: 00C92312
                                                                                                                                                                                                                                                  • GetWindowRect.USER32(00000000), ref: 00C92319
                                                                                                                                                                                                                                                  • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00C92355
                                                                                                                                                                                                                                                  • GetCursorPos.USER32(?), ref: 00C92381
                                                                                                                                                                                                                                                  • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00C923DF
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2387181109-0
                                                                                                                                                                                                                                                  • Opcode ID: b81d616df88a976d8a95ff010932c24f8e72aff0a500cbbf2e2460f38ed5c356
                                                                                                                                                                                                                                                  • Instruction ID: 9d5d4be7bc95b757c138a3acdefb6ab89f140163e27e25b19d7aa6fb04eebd38
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: b81d616df88a976d8a95ff010932c24f8e72aff0a500cbbf2e2460f38ed5c356
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2031FE72504315AFCB20DF14C849F9BBBADFF88714F000919F99897191DB34EA08CB92
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C19CB3: _wcslen.LIBCMT ref: 00C19CBD
                                                                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00C89B78
                                                                                                                                                                                                                                                  • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00C89C8B
                                                                                                                                                                                                                                                    • Part of subcall function 00C83874: GetInputState.USER32 ref: 00C838CB
                                                                                                                                                                                                                                                    • Part of subcall function 00C83874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00C83966
                                                                                                                                                                                                                                                  • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00C89BA8
                                                                                                                                                                                                                                                  • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00C89C75
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                                                                                                                                                                                                                  • String ID: *.*
                                                                                                                                                                                                                                                  • API String ID: 1972594611-438819550
                                                                                                                                                                                                                                                  • Opcode ID: cfd9b39f80ff6c258302822064668e23c6786815251343e8b2b4d56524b03cbb
                                                                                                                                                                                                                                                  • Instruction ID: 3ac44d4ff78999e4f74b1ea33c8873cadde8860617dcecc82b4f1edb507b8333
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: cfd9b39f80ff6c258302822064668e23c6786815251343e8b2b4d56524b03cbb
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4541717190020AAFDF15EFA4C885AFEBBB4EF46314F14415AE815A3191EB319F84DF64
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C29BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00C29BB2
                                                                                                                                                                                                                                                  • DefDlgProcW.USER32(?,?,?,?,?), ref: 00C29A4E
                                                                                                                                                                                                                                                  • GetSysColor.USER32(0000000F), ref: 00C29B23
                                                                                                                                                                                                                                                  • SetBkColor.GDI32(?,00000000), ref: 00C29B36
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Color$LongProcWindow
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3131106179-0
                                                                                                                                                                                                                                                  • Opcode ID: 95f9e1c0417b10cf0901eb4a7801236ec78a4380d3bffb4c27e412d5ef429c91
                                                                                                                                                                                                                                                  • Instruction ID: ff0996f53c95b79afa399f1ae77a3d5149b16e116aec00ae80e0c45a4e75c88b
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 95f9e1c0417b10cf0901eb4a7801236ec78a4380d3bffb4c27e412d5ef429c91
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: F3A13770108564EEE739AA2DACC9E7F269DDF43308F150609F522DADA1CA35DE41E271
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C9304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00C9307A
                                                                                                                                                                                                                                                    • Part of subcall function 00C9304E: _wcslen.LIBCMT ref: 00C9309B
                                                                                                                                                                                                                                                  • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00C9185D
                                                                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 00C91884
                                                                                                                                                                                                                                                  • bind.WSOCK32(00000000,?,00000010), ref: 00C918DB
                                                                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 00C918E6
                                                                                                                                                                                                                                                  • closesocket.WSOCK32(00000000), ref: 00C91915
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1601658205-0
                                                                                                                                                                                                                                                  • Opcode ID: 722c28c48615a5d6fe5660fd411ba61465aef6c286d4e14202123984ddc28ea1
                                                                                                                                                                                                                                                  • Instruction ID: 3d5584aac58c5453319ee5b3a5e6110b8948b8ee40130347cc91b7d1dfcb5fe0
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 722c28c48615a5d6fe5660fd411ba61465aef6c286d4e14202123984ddc28ea1
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: D651B371A00210AFDB10AF24D88AF6A77E5AB45718F188098F9159F3D3D771ED41EBA1
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 292994002-0
                                                                                                                                                                                                                                                  • Opcode ID: 5b7f1c1f2e9e52d5300573d50f6330ed95c96b8ad649c2281661aa98d181c1c7
                                                                                                                                                                                                                                                  • Instruction ID: 52459e67f90c1292a1c9c0ce949a117be2bbf1a752b3bc49b672a58e89a346f3
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5b7f1c1f2e9e52d5300573d50f6330ed95c96b8ad649c2281661aa98d181c1c7
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 66219F317406125FD7218F2AC884B6A7BE5EF8632CF1D8068E8568B351CB71ED42DB94
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                                  • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                                                                                                                                                                                                                  • API String ID: 0-1546025612
                                                                                                                                                                                                                                                  • Opcode ID: 1a38536d152957bac10c73461c9699d211b5c5b5de7b6ec4b75f7ae0d24172de
                                                                                                                                                                                                                                                  • Instruction ID: fe406dc31e7628f22cc89dd2df615f0e82a2a9415cb22bdb497157a3d48a6544
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1a38536d152957bac10c73461c9699d211b5c5b5de7b6ec4b75f7ae0d24172de
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 41A2AE74E0461ACBDF24CF58C8507EEB7B1BB55311F6481A9EC25A7280EB309EC9DB94
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00C7AAAC
                                                                                                                                                                                                                                                  • SetKeyboardState.USER32(00000080), ref: 00C7AAC8
                                                                                                                                                                                                                                                  • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00C7AB36
                                                                                                                                                                                                                                                  • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00C7AB88
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: KeyboardState$InputMessagePostSend
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 432972143-0
                                                                                                                                                                                                                                                  • Opcode ID: 02f17f708fb345e748fc4d95405730061295b07a539c662b5f0ee1eb2e912122
                                                                                                                                                                                                                                                  • Instruction ID: f2b0867b383ab15e6023c237aa8df25e781761fb8164e487c19ef1caeb707cf3
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 02f17f708fb345e748fc4d95405730061295b07a539c662b5f0ee1eb2e912122
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0C311870A40208AFFF35CA65CC05BFE7BA6EBC5310F04C21AF199561D1D3749A85D7A2
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C4BB7F
                                                                                                                                                                                                                                                    • Part of subcall function 00C429C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00C4D7D1,00000000,00000000,00000000,00000000,?,00C4D7F8,00000000,00000007,00000000,?,00C4DBF5,00000000), ref: 00C429DE
                                                                                                                                                                                                                                                    • Part of subcall function 00C429C8: GetLastError.KERNEL32(00000000,?,00C4D7D1,00000000,00000000,00000000,00000000,?,00C4D7F8,00000000,00000007,00000000,?,00C4DBF5,00000000,00000000), ref: 00C429F0
                                                                                                                                                                                                                                                  • GetTimeZoneInformation.KERNEL32 ref: 00C4BB91
                                                                                                                                                                                                                                                  • WideCharToMultiByte.KERNEL32(00000000,?,00CE121C,000000FF,?,0000003F,?,?), ref: 00C4BC09
                                                                                                                                                                                                                                                  • WideCharToMultiByte.KERNEL32(00000000,?,00CE1270,000000FF,?,0000003F,?,?,?,00CE121C,000000FF,?,0000003F,?,?), ref: 00C4BC36
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 806657224-0
                                                                                                                                                                                                                                                  • Opcode ID: 7a874c74ace0299fc58b1ca3638a92103ae8361e5469664dbce3da17df66a6e1
                                                                                                                                                                                                                                                  • Instruction ID: 67326fb09635e921603fae1a21607365747ed91101709e1d6755656044d63ecb
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7a874c74ace0299fc58b1ca3638a92103ae8361e5469664dbce3da17df66a6e1
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1931AF71904245DFCB11DF6ACCC0A6DBBB8FF4632071846AAE560DB2B1D7309E51DB90
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • InternetReadFile.WININET(?,?,00000400,?), ref: 00C8CE89
                                                                                                                                                                                                                                                  • GetLastError.KERNEL32(?,00000000), ref: 00C8CEEA
                                                                                                                                                                                                                                                  • SetEvent.KERNEL32(?,?,00000000), ref: 00C8CEFE
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ErrorEventFileInternetLastRead
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 234945975-0
                                                                                                                                                                                                                                                  • Opcode ID: 23610c7ac831c0e3ba280ac5e41b62580356e9fd803e50357c981c966e46277d
                                                                                                                                                                                                                                                  • Instruction ID: f72ce9c5a990b5995e92bf70b9c9cc8d674e1a75c593d77ff1f933ee7c3f7191
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 23610c7ac831c0e3ba280ac5e41b62580356e9fd803e50357c981c966e46277d
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5321BD71500305ABEB30EFA5C988BAAB7F8EB50318F10441EE656D2151EB74EE049B68
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00C782AA
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: lstrlen
                                                                                                                                                                                                                                                  • String ID: ($|
                                                                                                                                                                                                                                                  • API String ID: 1659193697-1631851259
                                                                                                                                                                                                                                                  • Opcode ID: fcc459b754abe5462579cbbdbdd1e52b3d154350530d50b2e51e1733745b9a69
                                                                                                                                                                                                                                                  • Instruction ID: ae9bd85e39902a8ff3419827db06c5350606f1c3d08549a44b5cd1cf9f165d30
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: fcc459b754abe5462579cbbdbdd1e52b3d154350530d50b2e51e1733745b9a69
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: C9323674A007059FCB28CF69C085A6AB7F0FF48710B15C56EE5AADB7A1EB70E941CB50
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00C85CC1
                                                                                                                                                                                                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00C85D17
                                                                                                                                                                                                                                                  • FindClose.KERNEL32(?), ref: 00C85D5F
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Find$File$CloseFirstNext
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3541575487-0
                                                                                                                                                                                                                                                  • Opcode ID: e7a161831c0f21224f296e1b75d2f8c151896a867c39bcb8ccbf22983ee8e43a
                                                                                                                                                                                                                                                  • Instruction ID: 31bfc3ddfbca2101ed57623dd027a17c45aa67d015f4031f2540ef8a09a4aa63
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e7a161831c0f21224f296e1b75d2f8c151896a867c39bcb8ccbf22983ee8e43a
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 27519974604A019FC714EF28C494A9AB7E4FF4A318F14855EE96A8B3A2CB70ED45CF91
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • IsDebuggerPresent.KERNEL32 ref: 00C4271A
                                                                                                                                                                                                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00C42724
                                                                                                                                                                                                                                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 00C42731
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3906539128-0
                                                                                                                                                                                                                                                  • Opcode ID: b2a2e7f47e5e7b916f240b3926fbcc8c6ab46d69a26f538d0bff18c11d64a6b9
                                                                                                                                                                                                                                                  • Instruction ID: 8c30f725d9dec06c0dd91ae06de8547ee204fd7c8bfb8ed0fc42230bda738134
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: b2a2e7f47e5e7b916f240b3926fbcc8c6ab46d69a26f538d0bff18c11d64a6b9
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: E531A27591121CABCB21DF68D9897DDBBB8BF08310F5041EAE81CA7261E7709F819F45
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 00C851DA
                                                                                                                                                                                                                                                  • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00C85238
                                                                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000000), ref: 00C852A1
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ErrorMode$DiskFreeSpace
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1682464887-0
                                                                                                                                                                                                                                                  • Opcode ID: cd57ff228f3b2430ba7b32fc8d2e35d163823a9a3ef9feef6c51dd38eee506aa
                                                                                                                                                                                                                                                  • Instruction ID: 61caebde287bb17ff8940858f865fa32334aa1ca2f121f1d68023dcc5453e6e0
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: cd57ff228f3b2430ba7b32fc8d2e35d163823a9a3ef9feef6c51dd38eee506aa
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: BC312B75A005189FDB00EF94D8C4FADBBB5FF49318F048099E905AB3A2DB71E956CB90
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C2FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00C30668
                                                                                                                                                                                                                                                    • Part of subcall function 00C2FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00C30685
                                                                                                                                                                                                                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00C7170D
                                                                                                                                                                                                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00C7173A
                                                                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00C7174A
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 577356006-0
                                                                                                                                                                                                                                                  • Opcode ID: 02f8f302de5661ad30f5d1b4ca3330f2dd9feebe6be8ff91f1ec48d593986c76
                                                                                                                                                                                                                                                  • Instruction ID: 95afc9644fc49420901adc2015bfe554fce427b6e08aecd6252694bed578d075
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 02f8f302de5661ad30f5d1b4ca3330f2dd9feebe6be8ff91f1ec48d593986c76
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2E1191B2414308AFD7189F54ECC6E6AB7BDEB44714B24C52EF45657641EB70BC428A20
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00C7D608
                                                                                                                                                                                                                                                  • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00C7D645
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00C7D650
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CloseControlCreateDeviceFileHandle
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 33631002-0
                                                                                                                                                                                                                                                  • Opcode ID: c7855c093ac968e1313c3222559917f35219d161852a5147b9f8f63ebaa309cf
                                                                                                                                                                                                                                                  • Instruction ID: eed8662c7cf55e8935ce41db6e9080b8e44a9254a1029fd949942f90c9a45d6f
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c7855c093ac968e1313c3222559917f35219d161852a5147b9f8f63ebaa309cf
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: F6115E75E05228BFDB108F95DC85FAFBBBCEB45B60F108515F918E7290D6704A058BA1
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00C7168C
                                                                                                                                                                                                                                                  • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00C716A1
                                                                                                                                                                                                                                                  • FreeSid.ADVAPI32(?), ref: 00C716B1
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3429775523-0
                                                                                                                                                                                                                                                  • Opcode ID: bff7a0d9a5cb832bfb21b234867fe59d512c323820def197e7ea3a00f5fd32e8
                                                                                                                                                                                                                                                  • Instruction ID: 898343ee388d655ec6f12f1e0bc00277d922201809b093cc4f8b6086b2058117
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: bff7a0d9a5cb832bfb21b234867fe59d512c323820def197e7ea3a00f5fd32e8
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: B4F0F47195030DFBDB00DFE4DC89AAEBBBCEB08604F508565E901E2181E774AA448A50
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetUserNameW.ADVAPI32(?,?), ref: 00C6D28C
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: NameUser
                                                                                                                                                                                                                                                  • String ID: X64
                                                                                                                                                                                                                                                  • API String ID: 2645101109-893830106
                                                                                                                                                                                                                                                  • Opcode ID: be7f165c43e8ae9649a83f4ff9f4f0fe053e62017de12ad1a16b1745a99e20e0
                                                                                                                                                                                                                                                  • Instruction ID: cbc79ea8dae363fc5df70ce96358180b562a8a6ce589af106061b0a5be7de481
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: be7f165c43e8ae9649a83f4ff9f4f0fe053e62017de12ad1a16b1745a99e20e0
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: DBD0CAB480116DEACBA0CBA0ECC8EDEB7BCBB14309F100292F106A2000DB309A488F20
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                                  • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                                                                                                                                                                                                  • Instruction ID: 8894962b4598f3fe915d4ca39a0204fc49701403902d9fcb38243183b20ce92a
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: F2021D72E102199BDF14DFA9D8C06ADFBF1EF48314F258169D829F7384D731AA418B94
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00C86918
                                                                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00C86961
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Find$CloseFileFirst
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2295610775-0
                                                                                                                                                                                                                                                  • Opcode ID: eb4d9e66360b8a78f79573fa8fb2ba595ac58953673f747a709655c2c9e33bac
                                                                                                                                                                                                                                                  • Instruction ID: 5a1de72ba758379a097a29bf80ed1de3cb38a48bdaacd57cb4514d162d054e32
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: eb4d9e66360b8a78f79573fa8fb2ba595ac58953673f747a709655c2c9e33bac
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1B117C316042109FC710DF69D488A1ABBE5EF85328F14C699E4698B7A2CB30EC45CB91
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00C94891,?,?,00000035,?), ref: 00C837E4
                                                                                                                                                                                                                                                  • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00C94891,?,?,00000035,?), ref: 00C837F4
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ErrorFormatLastMessage
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3479602957-0
                                                                                                                                                                                                                                                  • Opcode ID: e43ce31e6a99222dc2997b5631f50ecdfc0c11d0d62e5cd3084d3c6ed89b303e
                                                                                                                                                                                                                                                  • Instruction ID: cb73d12b166f1e19a0a27626f7a8fe1f3b4cce4565741aed640d70d5c22dd2ea
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e43ce31e6a99222dc2997b5631f50ecdfc0c11d0d62e5cd3084d3c6ed89b303e
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 38F0EC707052142AD71067664C8DFDB369DDFC5B65F000275F505D32D1D9609944C7B0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00C7B25D
                                                                                                                                                                                                                                                  • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 00C7B270
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: InputSendkeybd_event
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3536248340-0
                                                                                                                                                                                                                                                  • Opcode ID: bc23a3b532b469837c1af17165f28f159e5f4f61b62308a9e8e3b725311218c3
                                                                                                                                                                                                                                                  • Instruction ID: e16f186d3bd8d0b67185c778b6b6608db78b5e7884a08d45f57ec85398ce212b
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: bc23a3b532b469837c1af17165f28f159e5f4f61b62308a9e8e3b725311218c3
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 63F0177180428EABDB059FA1C806BBE7BB4FF09309F00800AF965A61A2C37986119F94
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00C711FC), ref: 00C710D4
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,00C711FC), ref: 00C710E9
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: AdjustCloseHandlePrivilegesToken
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 81990902-0
                                                                                                                                                                                                                                                  • Opcode ID: d8943918e0b4a7b1d4316ede3d70ab1057746560d9a9bfaafd7cd6a013d5d0d3
                                                                                                                                                                                                                                                  • Instruction ID: 1bf079d85bd97b1309aa5e3218651f9687a906fe9dbff86da87f3f35ff50a1ac
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: d8943918e0b4a7b1d4316ede3d70ab1057746560d9a9bfaafd7cd6a013d5d0d3
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: EEE04F32004610AEE7252B15FC05FB777A9EF04320F14882DF4A6814B1DB626C90EB10
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  • Variable is not of type 'Object'., xrefs: 00C60C40
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                                  • String ID: Variable is not of type 'Object'.
                                                                                                                                                                                                                                                  • API String ID: 0-1840281001
                                                                                                                                                                                                                                                  • Opcode ID: ee29227a30e8f850d9649cdefe14f00c80b9280e634b383e88010174faedf57d
                                                                                                                                                                                                                                                  • Instruction ID: 5a7f2ca92053cd82ee79e8c1a6cdb1a61c29ffaf67184bf4616391ccaec4885d
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: ee29227a30e8f850d9649cdefe14f00c80b9280e634b383e88010174faedf57d
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: DB32AE30940218DBCF24DF94D8D1AEEB7B5FF06304F248059F816AB292D735AE86EB51
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00C46766,?,?,00000008,?,?,00C4FEFE,00000000), ref: 00C46998
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ExceptionRaise
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3997070919-0
                                                                                                                                                                                                                                                  • Opcode ID: 6f7e0484133966bb2604fb18c379eb1b12d0b42764fbd87d34a67e041b2ec68f
                                                                                                                                                                                                                                                  • Instruction ID: 0925d2ffd9d8a33951c5a309b2772b0767da1d4e6bad6e5f0d2a04d9e028f324
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6f7e0484133966bb2604fb18c379eb1b12d0b42764fbd87d34a67e041b2ec68f
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2EB14C316106089FD715CF28C486B657BE0FF46368F258658E8E9CF2E6C335EA91CB41
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 0-3916222277
                                                                                                                                                                                                                                                  • Opcode ID: 3196eb8806bcf009b612c7e23ca401bd271dd0cea73bfd2cca6050edd52228d1
                                                                                                                                                                                                                                                  • Instruction ID: dfe0c99ed0e16f95f08f602380d8ce1aae399e6a3624bfc857e2ede2558a2488
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3196eb8806bcf009b612c7e23ca401bd271dd0cea73bfd2cca6050edd52228d1
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 91127E71D002299BCB24DF59D8806EEB7F5FF48310F1481AAE859EB251DB309E85DF90
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • BlockInput.USER32(00000001), ref: 00C8EABD
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: BlockInput
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3456056419-0
                                                                                                                                                                                                                                                  • Opcode ID: 2726b5a806b37ab9c7252284116c77cd4e646d98368d6a27c337248c587e7782
                                                                                                                                                                                                                                                  • Instruction ID: 66d9ef0073953bd7545f71ba37ef35e0037187c3a25581f5ec9156968ab65642
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2726b5a806b37ab9c7252284116c77cd4e646d98368d6a27c337248c587e7782
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 86E01A31200204AFC710EF5AD844E9ABBE9AF99764F008416FC49C7351DA70E881AB90
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,00C303EE), ref: 00C309DA
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ExceptionFilterUnhandled
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3192549508-0
                                                                                                                                                                                                                                                  • Opcode ID: fe9d2f5e2414aa138904cbd89e183879a4ac44fa8df305a4ccf03c403a4390aa
                                                                                                                                                                                                                                                  • Instruction ID: bcd5e5b7ac518b4d10a9a3abc5cdc8a01e7340b3ceedb4279bfa92d12fd79366
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: fe9d2f5e2414aa138904cbd89e183879a4ac44fa8df305a4ccf03c403a4390aa
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash:
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                                  • String ID: 0
                                                                                                                                                                                                                                                  • API String ID: 0-4108050209
                                                                                                                                                                                                                                                  • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                                                                                                                                                                                                  • Instruction ID: 3fb99e9943a86ff3dcaf643888caa725ae425c106688d0badbddf5a3c03b1c09
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 345168F163C7456BDF388569895EBBE63D99B06300F180B09E8A2EB2C2C615DF05E353
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                                  • Opcode ID: 8f13ecc687bd88667465eb24ecf397931a71fcb07ff248d553a8dbc6d7dfc077
                                                                                                                                                                                                                                                  • Instruction ID: d2077ef76cba0b0e5c03431ffe619f395ff722b22e1f6bb21134b3159823f6f7
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8f13ecc687bd88667465eb24ecf397931a71fcb07ff248d553a8dbc6d7dfc077
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: BC321332D29F414DDB239635CC2233AA649BFB73C5F15D737E82AB5AA5EB29C5834100
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                                  • Opcode ID: a89413fba1c3d778ee3237d6e3c89706a67a1afe8d13432c3e3442958e0eebbc
                                                                                                                                                                                                                                                  • Instruction ID: eb0ebfad99496317d305605af0bc04efb408d1450eec7ecf53559cd84f238466
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: a89413fba1c3d778ee3237d6e3c89706a67a1afe8d13432c3e3442958e0eebbc
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 50320531A042658BCF38CF69D8D467D7BA1EB45300F28856BD4EADB692D234DF81EB41
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                                  • Opcode ID: b40108f5e4f9c121beec9a37d8b8793bf46366e84d137d008a01562b6c33fd73
                                                                                                                                                                                                                                                  • Instruction ID: e44d7eefcba407515c2434a493a258d1f61a5c3d9e2f578758de0499de92dbc4
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: b40108f5e4f9c121beec9a37d8b8793bf46366e84d137d008a01562b6c33fd73
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2422F470A04609DFDF04CF65D891AEEB3F5FF45300F204229E816A72A1EB359E95EB54
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                                  • Opcode ID: 9b4e9be6b16b91a61068f9941345eb7e26934634925bc70afab6f25c5aca8bd7
                                                                                                                                                                                                                                                  • Instruction ID: 05a39719ba85eb05b98ed9cbcb165f4f2bc05c520f3a78dcd83d55e0ccdc46a1
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9b4e9be6b16b91a61068f9941345eb7e26934634925bc70afab6f25c5aca8bd7
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5102E7B5E00209EBDB04DF64D881AAEB7B5FF44300F118169E816DB290EB31EF95DB95
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                                  • Opcode ID: 8d9ed0d6c8847688aac8b9cd9d22f1bd0e2e628a8b0eab23a3a3f44eb1cfe6b2
                                                                                                                                                                                                                                                  • Instruction ID: bd24718d2bb88eaf5885db3b7e0d24954258418df7d6a7b146eb6bcb3a6a4a78
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8d9ed0d6c8847688aac8b9cd9d22f1bd0e2e628a8b0eab23a3a3f44eb1cfe6b2
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 96B1E220D2AF804DD3239639883133BB69CAFBB6D5F91D71BFC1674D62EB2286834140
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                                  • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                                                                                                                                                                  • Instruction ID: 43338182a2d6a5f3ff183443a6a9bd893b949779adc219cc9a276c837356eab1
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: BC9179721280A34EDB6A463E857407EFFE15A523A1B1E079DDCF2CA1C5FE14CA54D620
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                                  • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                                                                                                                                                                  • Instruction ID: bcd81bb5a3eaf161e274f3420697d77f8b60442c2b0ffbb760e8bd273c5585d2
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 91916A722190A34DDF6D467E857403DFFE15A923A1B1E079DD8F2CB1C5EE24CA58E620
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                                  • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                                                                                                                                                                  • Instruction ID: a9b82f9d75931e5631de39726bbb90f50f40b317f2a3a9231650aeba284e67ad
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 129187722190E34EDB2D427A857403DFFE15A923A6B1E079DD8F2CA1C1FD14C764E620
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                                  • Opcode ID: 3e0e6c0761db7c23f07272b0b7a30dd4369b62ae0542d33859df5373bfe1e60d
                                                                                                                                                                                                                                                  • Instruction ID: 643904d3a0b8dded7f6f7d9b4c675b06ab938f8e7f3d3393e007c86f766faf78
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3e0e6c0761db7c23f07272b0b7a30dd4369b62ae0542d33859df5373bfe1e60d
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 88618AF1238309A7DE349A2C8CA5BBEB3A4DF41708F101B1AF853DB281D6119F46E755
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                                  • Opcode ID: f00483d1692421cf4d7de9aaa8fe928b5afb94107b427faf4014b85e0458c3f8
                                                                                                                                                                                                                                                  • Instruction ID: 20783a467cc73c73d66115a0ac3fb730ac9ed82e1e303e1df077d8fc2d714c0e
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: f00483d1692421cf4d7de9aaa8fe928b5afb94107b427faf4014b85e0458c3f8
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 57617AF12387096BDE389A288896BFF2398DF41700F100B59F863DB281DA129F469355
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                                  • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                                                                                                                                                                  • Instruction ID: fdd2b72d5224a755e2735ab1c4006bdc2c01ad347278ae12fdfbef849f14083a
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 988187336191A34DDB6D863A853453EFFE15A923A1B1E079DD8F2CB1C1EE24C754E620
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                                  • Opcode ID: 5550a333b2ee5a4d0324193588281bbc428a8f87a40c879ae749dc54e17023df
                                                                                                                                                                                                                                                  • Instruction ID: 4896f08b01dbe2ad31923af2ea2efadf89ec975c4f780b72df6a0269d898cbea
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5550a333b2ee5a4d0324193588281bbc428a8f87a40c879ae749dc54e17023df
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7821E7326206118BDB28CF79C82377E73E9A794314F14862EE4A7C73D0DE75A904CB84
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • DeleteObject.GDI32(00000000), ref: 00C92B30
                                                                                                                                                                                                                                                  • DeleteObject.GDI32(00000000), ref: 00C92B43
                                                                                                                                                                                                                                                  • DestroyWindow.USER32 ref: 00C92B52
                                                                                                                                                                                                                                                  • GetDesktopWindow.USER32 ref: 00C92B6D
                                                                                                                                                                                                                                                  • GetWindowRect.USER32(00000000), ref: 00C92B74
                                                                                                                                                                                                                                                  • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00C92CA3
                                                                                                                                                                                                                                                  • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00C92CB1
                                                                                                                                                                                                                                                  • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C92CF8
                                                                                                                                                                                                                                                  • GetClientRect.USER32(00000000,?), ref: 00C92D04
                                                                                                                                                                                                                                                  • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00C92D40
                                                                                                                                                                                                                                                  • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C92D62
                                                                                                                                                                                                                                                  • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C92D75
                                                                                                                                                                                                                                                  • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C92D80
                                                                                                                                                                                                                                                  • GlobalLock.KERNEL32(00000000), ref: 00C92D89
                                                                                                                                                                                                                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C92D98
                                                                                                                                                                                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00C92DA1
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C92DA8
                                                                                                                                                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 00C92DB3
                                                                                                                                                                                                                                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C92DC5
                                                                                                                                                                                                                                                  • OleLoadPicture.OLEAUT32(?,00000000,00000000,00CAFC38,00000000), ref: 00C92DDB
                                                                                                                                                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 00C92DEB
                                                                                                                                                                                                                                                  • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00C92E11
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00C92E30
                                                                                                                                                                                                                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C92E52
                                                                                                                                                                                                                                                  • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C9303F
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                                                                                                                                                                                                  • String ID: $AutoIt v3$DISPLAY$static
                                                                                                                                                                                                                                                  • API String ID: 2211948467-2373415609
                                                                                                                                                                                                                                                  • Opcode ID: 6d607390641683a0ce40343edc66ff78a358d93fc7321751818443f9a491bd32
                                                                                                                                                                                                                                                  • Instruction ID: 10dcbc83a2aa7fb9b659812adb289d66c99a7221f211a1db8fe5f5c058258945
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6d607390641683a0ce40343edc66ff78a358d93fc7321751818443f9a491bd32
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 05027A71A00215AFDB14DFA4CC89FAE7BB9EB4A314F048158F915AB2A1DB74ED41CF60
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SetTextColor.GDI32(?,00000000), ref: 00CA712F
                                                                                                                                                                                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 00CA7160
                                                                                                                                                                                                                                                  • GetSysColor.USER32(0000000F), ref: 00CA716C
                                                                                                                                                                                                                                                  • SetBkColor.GDI32(?,000000FF), ref: 00CA7186
                                                                                                                                                                                                                                                  • SelectObject.GDI32(?,?), ref: 00CA7195
                                                                                                                                                                                                                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 00CA71C0
                                                                                                                                                                                                                                                  • GetSysColor.USER32(00000010), ref: 00CA71C8
                                                                                                                                                                                                                                                  • CreateSolidBrush.GDI32(00000000), ref: 00CA71CF
                                                                                                                                                                                                                                                  • FrameRect.USER32(?,?,00000000), ref: 00CA71DE
                                                                                                                                                                                                                                                  • DeleteObject.GDI32(00000000), ref: 00CA71E5
                                                                                                                                                                                                                                                  • InflateRect.USER32(?,000000FE,000000FE), ref: 00CA7230
                                                                                                                                                                                                                                                  • FillRect.USER32(?,?,?), ref: 00CA7262
                                                                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00CA7284
                                                                                                                                                                                                                                                    • Part of subcall function 00CA73E8: GetSysColor.USER32(00000012), ref: 00CA7421
                                                                                                                                                                                                                                                    • Part of subcall function 00CA73E8: SetTextColor.GDI32(?,?), ref: 00CA7425
                                                                                                                                                                                                                                                    • Part of subcall function 00CA73E8: GetSysColorBrush.USER32(0000000F), ref: 00CA743B
                                                                                                                                                                                                                                                    • Part of subcall function 00CA73E8: GetSysColor.USER32(0000000F), ref: 00CA7446
                                                                                                                                                                                                                                                    • Part of subcall function 00CA73E8: GetSysColor.USER32(00000011), ref: 00CA7463
                                                                                                                                                                                                                                                    • Part of subcall function 00CA73E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00CA7471
                                                                                                                                                                                                                                                    • Part of subcall function 00CA73E8: SelectObject.GDI32(?,00000000), ref: 00CA7482
                                                                                                                                                                                                                                                    • Part of subcall function 00CA73E8: SetBkColor.GDI32(?,00000000), ref: 00CA748B
                                                                                                                                                                                                                                                    • Part of subcall function 00CA73E8: SelectObject.GDI32(?,?), ref: 00CA7498
                                                                                                                                                                                                                                                    • Part of subcall function 00CA73E8: InflateRect.USER32(?,000000FF,000000FF), ref: 00CA74B7
                                                                                                                                                                                                                                                    • Part of subcall function 00CA73E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00CA74CE
                                                                                                                                                                                                                                                    • Part of subcall function 00CA73E8: GetWindowLongW.USER32(00000000,000000F0), ref: 00CA74DB
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 4124339563-0
                                                                                                                                                                                                                                                  • Opcode ID: eba278c8448569272170516b3ac13ba4e95ef714ba603f97f5adb2314e828589
                                                                                                                                                                                                                                                  • Instruction ID: 1825546b286a3a670e1151d135764433183956d729aa00566dcbe3a44da242f0
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: eba278c8448569272170516b3ac13ba4e95ef714ba603f97f5adb2314e828589
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 70A18D72508302AFDB119F60DC88B6F7BE9FB4A328F100B19FA62971A1D771E9449B51
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • DestroyWindow.USER32(?,?), ref: 00C28E14
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001308,?,00000000), ref: 00C66AC5
                                                                                                                                                                                                                                                  • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00C66AFE
                                                                                                                                                                                                                                                  • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00C66F43
                                                                                                                                                                                                                                                    • Part of subcall function 00C28F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00C28BE8,?,00000000,?,?,?,?,00C28BBA,00000000,?), ref: 00C28FC5
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001053), ref: 00C66F7F
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00C66F96
                                                                                                                                                                                                                                                  • ImageList_Destroy.COMCTL32(00000000,?), ref: 00C66FAC
                                                                                                                                                                                                                                                  • ImageList_Destroy.COMCTL32(00000000,?), ref: 00C66FB7
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                                                                                                                                                                                                                  • String ID: 0
                                                                                                                                                                                                                                                  • API String ID: 2760611726-4108050209
                                                                                                                                                                                                                                                  • Opcode ID: 18cfb282dc00eb57ac06d01982bc30b9e6b85a9065c0ee7caec26a0af51497c3
                                                                                                                                                                                                                                                  • Instruction ID: 423f5199a2726ac168f175ca6106aa1df45e47ac56e33e74fddcd6d1c7c6aab7
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 18cfb282dc00eb57ac06d01982bc30b9e6b85a9065c0ee7caec26a0af51497c3
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: D612CB34201251EFDB25CF28D8C4BAAB7E1FB45300F184469F4A58B662CB32ED66DF91
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • DestroyWindow.USER32(00000000), ref: 00C9273E
                                                                                                                                                                                                                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00C9286A
                                                                                                                                                                                                                                                  • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00C928A9
                                                                                                                                                                                                                                                  • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00C928B9
                                                                                                                                                                                                                                                  • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00C92900
                                                                                                                                                                                                                                                  • GetClientRect.USER32(00000000,?), ref: 00C9290C
                                                                                                                                                                                                                                                  • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00C92955
                                                                                                                                                                                                                                                  • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00C92964
                                                                                                                                                                                                                                                  • GetStockObject.GDI32(00000011), ref: 00C92974
                                                                                                                                                                                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00C92978
                                                                                                                                                                                                                                                  • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00C92988
                                                                                                                                                                                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00C92991
                                                                                                                                                                                                                                                  • DeleteDC.GDI32(00000000), ref: 00C9299A
                                                                                                                                                                                                                                                  • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00C929C6
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000030,00000000,00000001), ref: 00C929DD
                                                                                                                                                                                                                                                  • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00C92A1D
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00C92A31
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000404,00000001,00000000), ref: 00C92A42
                                                                                                                                                                                                                                                  • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00C92A77
                                                                                                                                                                                                                                                  • GetStockObject.GDI32(00000011), ref: 00C92A82
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00C92A8D
                                                                                                                                                                                                                                                  • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00C92A97
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                                                                                                                                                                                  • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                                                                                                                                                                                  • API String ID: 2910397461-517079104
                                                                                                                                                                                                                                                  • Opcode ID: d9fe5674911840252d6cf6cc3ec526857399f12511b5f1b30713aa76edd1fa8d
                                                                                                                                                                                                                                                  • Instruction ID: 14286c5f5c91f5e0945c844052df509b28b25d93db7abdbd4c14f05409be830b
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: d9fe5674911840252d6cf6cc3ec526857399f12511b5f1b30713aa76edd1fa8d
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 24B14B71A00215BFEB14DFA8DC89FAE7BB9EB09714F044114FA15EB2A0D774AD40DBA4
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 00C84AED
                                                                                                                                                                                                                                                  • GetDriveTypeW.KERNEL32(?,00CACB68,?,\\.\,00CACC08), ref: 00C84BCA
                                                                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000000,00CACB68,?,\\.\,00CACC08), ref: 00C84D36
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ErrorMode$DriveType
                                                                                                                                                                                                                                                  • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                                                                                                                                                                                                  • API String ID: 2907320926-4222207086
                                                                                                                                                                                                                                                  • Opcode ID: 982190b7a958e68fd323a9949ee7f0f627a08dd316889f94c7ea95f4bab3eeea
                                                                                                                                                                                                                                                  • Instruction ID: 3deffb1f39202e7161e36c2d0435b6debddd5299b1dadc7fd2ea00d573e44cad
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 982190b7a958e68fd323a9949ee7f0f627a08dd316889f94c7ea95f4bab3eeea
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9F61B030705207DBCB08FF25CA819BDB7B5AB45308B248426F916AB791DB71EE41EB49
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetSysColor.USER32(00000012), ref: 00CA7421
                                                                                                                                                                                                                                                  • SetTextColor.GDI32(?,?), ref: 00CA7425
                                                                                                                                                                                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 00CA743B
                                                                                                                                                                                                                                                  • GetSysColor.USER32(0000000F), ref: 00CA7446
                                                                                                                                                                                                                                                  • CreateSolidBrush.GDI32(?), ref: 00CA744B
                                                                                                                                                                                                                                                  • GetSysColor.USER32(00000011), ref: 00CA7463
                                                                                                                                                                                                                                                  • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00CA7471
                                                                                                                                                                                                                                                  • SelectObject.GDI32(?,00000000), ref: 00CA7482
                                                                                                                                                                                                                                                  • SetBkColor.GDI32(?,00000000), ref: 00CA748B
                                                                                                                                                                                                                                                  • SelectObject.GDI32(?,?), ref: 00CA7498
                                                                                                                                                                                                                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 00CA74B7
                                                                                                                                                                                                                                                  • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00CA74CE
                                                                                                                                                                                                                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 00CA74DB
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00CA752A
                                                                                                                                                                                                                                                  • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00CA7554
                                                                                                                                                                                                                                                  • InflateRect.USER32(?,000000FD,000000FD), ref: 00CA7572
                                                                                                                                                                                                                                                  • DrawFocusRect.USER32(?,?), ref: 00CA757D
                                                                                                                                                                                                                                                  • GetSysColor.USER32(00000011), ref: 00CA758E
                                                                                                                                                                                                                                                  • SetTextColor.GDI32(?,00000000), ref: 00CA7596
                                                                                                                                                                                                                                                  • DrawTextW.USER32(?,00CA70F5,000000FF,?,00000000), ref: 00CA75A8
                                                                                                                                                                                                                                                  • SelectObject.GDI32(?,?), ref: 00CA75BF
                                                                                                                                                                                                                                                  • DeleteObject.GDI32(?), ref: 00CA75CA
                                                                                                                                                                                                                                                  • SelectObject.GDI32(?,?), ref: 00CA75D0
                                                                                                                                                                                                                                                  • DeleteObject.GDI32(?), ref: 00CA75D5
                                                                                                                                                                                                                                                  • SetTextColor.GDI32(?,?), ref: 00CA75DB
                                                                                                                                                                                                                                                  • SetBkColor.GDI32(?,?), ref: 00CA75E5
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1996641542-0
                                                                                                                                                                                                                                                  • Opcode ID: d51de79c018901f78a50c74bd788f3b49d44e6bec3099b065fce481377512eee
                                                                                                                                                                                                                                                  • Instruction ID: 473ee47aa2a1b511768ca825ac890939da090013599805de6514dcbf9cbe9347
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: d51de79c018901f78a50c74bd788f3b49d44e6bec3099b065fce481377512eee
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 85615172D04219AFDB019FA4DC49BDE7FB9FB0A324F114125FA15A72A1D7709940DF90
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetCursorPos.USER32(?), ref: 00CA1128
                                                                                                                                                                                                                                                  • GetDesktopWindow.USER32 ref: 00CA113D
                                                                                                                                                                                                                                                  • GetWindowRect.USER32(00000000), ref: 00CA1144
                                                                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00CA1199
                                                                                                                                                                                                                                                  • DestroyWindow.USER32(?), ref: 00CA11B9
                                                                                                                                                                                                                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00CA11ED
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00CA120B
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00CA121D
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000421,?,?), ref: 00CA1232
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00CA1245
                                                                                                                                                                                                                                                  • IsWindowVisible.USER32(00000000), ref: 00CA12A1
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00CA12BC
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00CA12D0
                                                                                                                                                                                                                                                  • GetWindowRect.USER32(00000000,?), ref: 00CA12E8
                                                                                                                                                                                                                                                  • MonitorFromPoint.USER32(?,?,00000002), ref: 00CA130E
                                                                                                                                                                                                                                                  • GetMonitorInfoW.USER32(00000000,?), ref: 00CA1328
                                                                                                                                                                                                                                                  • CopyRect.USER32(?,?), ref: 00CA133F
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000412,00000000), ref: 00CA13AA
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                                                                                                                                                                                                  • String ID: ($0$tooltips_class32
                                                                                                                                                                                                                                                  • API String ID: 698492251-4156429822
                                                                                                                                                                                                                                                  • Opcode ID: f151216f7176fec2266e9f7e5717ec91a6084737bf69819f1f8c394831d0f28a
                                                                                                                                                                                                                                                  • Instruction ID: 01c94dd985fbad93a4d2b98f6737169a776292fd5b43b44fa0cc6fdc284c0cc7
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: f151216f7176fec2266e9f7e5717ec91a6084737bf69819f1f8c394831d0f28a
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A6B1AD71608342AFDB10DF64C884BAEBBE4FF86358F048918F9999B261C731EC45DB91
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00C28968
                                                                                                                                                                                                                                                  • GetSystemMetrics.USER32(00000007), ref: 00C28970
                                                                                                                                                                                                                                                  • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00C2899B
                                                                                                                                                                                                                                                  • GetSystemMetrics.USER32(00000008), ref: 00C289A3
                                                                                                                                                                                                                                                  • GetSystemMetrics.USER32(00000004), ref: 00C289C8
                                                                                                                                                                                                                                                  • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00C289E5
                                                                                                                                                                                                                                                  • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00C289F5
                                                                                                                                                                                                                                                  • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00C28A28
                                                                                                                                                                                                                                                  • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00C28A3C
                                                                                                                                                                                                                                                  • GetClientRect.USER32(00000000,000000FF), ref: 00C28A5A
                                                                                                                                                                                                                                                  • GetStockObject.GDI32(00000011), ref: 00C28A76
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000030,00000000), ref: 00C28A81
                                                                                                                                                                                                                                                    • Part of subcall function 00C2912D: GetCursorPos.USER32(?), ref: 00C29141
                                                                                                                                                                                                                                                    • Part of subcall function 00C2912D: ScreenToClient.USER32(00000000,?), ref: 00C2915E
                                                                                                                                                                                                                                                    • Part of subcall function 00C2912D: GetAsyncKeyState.USER32(00000001), ref: 00C29183
                                                                                                                                                                                                                                                    • Part of subcall function 00C2912D: GetAsyncKeyState.USER32(00000002), ref: 00C2919D
                                                                                                                                                                                                                                                  • SetTimer.USER32(00000000,00000000,00000028,00C290FC), ref: 00C28AA8
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                                                                                                                                                                                  • String ID: AutoIt v3 GUI
                                                                                                                                                                                                                                                  • API String ID: 1458621304-248962490
                                                                                                                                                                                                                                                  • Opcode ID: ec789efbbef0189a64813faaff9f9b647ffbe18e62b4932d6d4fea28127a3ce6
                                                                                                                                                                                                                                                  • Instruction ID: fdeb915b3375add4de256f22df95b1081f7364a6fa61dc1be5b67e374744cd1d
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: ec789efbbef0189a64813faaff9f9b647ffbe18e62b4932d6d4fea28127a3ce6
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 62B19B75A0021A9FDF24DFA8DD85BAE3BB5FB48314F154229FA15AB2D0DB34E940CB50
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C710F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00C71114
                                                                                                                                                                                                                                                    • Part of subcall function 00C710F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00C70B9B,?,?,?), ref: 00C71120
                                                                                                                                                                                                                                                    • Part of subcall function 00C710F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00C70B9B,?,?,?), ref: 00C7112F
                                                                                                                                                                                                                                                    • Part of subcall function 00C710F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00C70B9B,?,?,?), ref: 00C71136
                                                                                                                                                                                                                                                    • Part of subcall function 00C710F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00C7114D
                                                                                                                                                                                                                                                  • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00C70DF5
                                                                                                                                                                                                                                                  • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00C70E29
                                                                                                                                                                                                                                                  • GetLengthSid.ADVAPI32(?), ref: 00C70E40
                                                                                                                                                                                                                                                  • GetAce.ADVAPI32(?,00000000,?), ref: 00C70E7A
                                                                                                                                                                                                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00C70E96
                                                                                                                                                                                                                                                  • GetLengthSid.ADVAPI32(?), ref: 00C70EAD
                                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00C70EB5
                                                                                                                                                                                                                                                  • HeapAlloc.KERNEL32(00000000), ref: 00C70EBC
                                                                                                                                                                                                                                                  • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00C70EDD
                                                                                                                                                                                                                                                  • CopySid.ADVAPI32(00000000), ref: 00C70EE4
                                                                                                                                                                                                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00C70F13
                                                                                                                                                                                                                                                  • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00C70F35
                                                                                                                                                                                                                                                  • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00C70F47
                                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00C70F6E
                                                                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00C70F75
                                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00C70F7E
                                                                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00C70F85
                                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00C70F8E
                                                                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00C70F95
                                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00C70FA1
                                                                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00C70FA8
                                                                                                                                                                                                                                                    • Part of subcall function 00C71193: GetProcessHeap.KERNEL32(00000008,00C70BB1,?,00000000,?,00C70BB1,?), ref: 00C711A1
                                                                                                                                                                                                                                                    • Part of subcall function 00C71193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00C70BB1,?), ref: 00C711A8
                                                                                                                                                                                                                                                    • Part of subcall function 00C71193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00C70BB1,?), ref: 00C711B7
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 4175595110-0
                                                                                                                                                                                                                                                  • Opcode ID: 7f5bb584b72fef82ec10573a069492f0917c533908a339dc98a5c02ca1ac5fcc
                                                                                                                                                                                                                                                  • Instruction ID: 2844660dddd7b29a36d6e20d3af79d3c051397fe4af869a22a18e3fa1760dd32
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7f5bb584b72fef82ec10573a069492f0917c533908a339dc98a5c02ca1ac5fcc
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: E2715B72A0020AEBDF20DFA4DC85FAEBBB8BF05304F148115F969E7191D7719A15CB60
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C9C4BD
                                                                                                                                                                                                                                                  • RegCreateKeyExW.ADVAPI32(?,?,00000000,00CACC08,00000000,?,00000000,?,?), ref: 00C9C544
                                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00C9C5A4
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C9C5F4
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C9C66F
                                                                                                                                                                                                                                                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00C9C6B2
                                                                                                                                                                                                                                                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00C9C7C1
                                                                                                                                                                                                                                                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00C9C84D
                                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 00C9C881
                                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00C9C88E
                                                                                                                                                                                                                                                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00C9C960
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                                                                                                                                                                                                                  • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                                                                                                                                                                                  • API String ID: 9721498-966354055
                                                                                                                                                                                                                                                  • Opcode ID: 92b46a358b4931e5d12b4721ab5b4860fad4256916aaca03a131ebb407f7b9d0
                                                                                                                                                                                                                                                  • Instruction ID: aef9daaf552421f2b8e7ee10ab3f11d36551ef1073dbe0d3a4f0dc8ee3c0c4df
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 92b46a358b4931e5d12b4721ab5b4860fad4256916aaca03a131ebb407f7b9d0
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: EC1278312042019FDB14DF14C895B6AB7E5EF89714F05899CF89A9B3A2DB31FD41EB81
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • CharUpperBuffW.USER32(?,?), ref: 00CA09C6
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00CA0A01
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00CA0A54
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00CA0A8A
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00CA0B06
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00CA0B81
                                                                                                                                                                                                                                                    • Part of subcall function 00C2F9F2: _wcslen.LIBCMT ref: 00C2F9FD
                                                                                                                                                                                                                                                    • Part of subcall function 00C72BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00C72BFA
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                                                                                                                                                                                  • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                                                                                                                                                                                  • API String ID: 1103490817-4258414348
                                                                                                                                                                                                                                                  • Opcode ID: 02787938357308798475753ab6d8d9cc38043b05b44ca0f5edcfa98d1b81755f
                                                                                                                                                                                                                                                  • Instruction ID: 93c145f0e6eb6e7cc42f9fee53d24bd75a92f64f1bd70dd73ff55337d7f67e74
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 02787938357308798475753ab6d8d9cc38043b05b44ca0f5edcfa98d1b81755f
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: C8E1B0312083028FC714DF25C45096AB7E2FF9A358F248A5DF8A69B362D731EE45DB81
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                                                                  • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                                                                                                                                                                                                  • API String ID: 1256254125-909552448
                                                                                                                                                                                                                                                  • Opcode ID: f59425fb1c330587880c34c170adf3104843c9871ec1bef43117db06200bb7f9
                                                                                                                                                                                                                                                  • Instruction ID: efce02abb90c35067623be1112106340a05f58c833c9bb3c8481aa2313e101af
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: f59425fb1c330587880c34c170adf3104843c9871ec1bef43117db06200bb7f9
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: DA71053260016A8BCF20DE78CDD56BE3395AB61764F150629F87697284FA30CF81E3A0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00CA835A
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00CA836E
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00CA8391
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00CA83B4
                                                                                                                                                                                                                                                  • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00CA83F2
                                                                                                                                                                                                                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00CA361A,?), ref: 00CA844E
                                                                                                                                                                                                                                                  • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00CA8487
                                                                                                                                                                                                                                                  • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00CA84CA
                                                                                                                                                                                                                                                  • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00CA8501
                                                                                                                                                                                                                                                  • FreeLibrary.KERNEL32(?), ref: 00CA850D
                                                                                                                                                                                                                                                  • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00CA851D
                                                                                                                                                                                                                                                  • DestroyIcon.USER32(?), ref: 00CA852C
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00CA8549
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00CA8555
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                                                                                                                                                                                                                  • String ID: .dll$.exe$.icl
                                                                                                                                                                                                                                                  • API String ID: 799131459-1154884017
                                                                                                                                                                                                                                                  • Opcode ID: 591b6666dbd1993e9106271b20b004e3d433ad4220c5ab75c0912026f7e9f756
                                                                                                                                                                                                                                                  • Instruction ID: 320cb0206bb972ff8fbc0009d0e9566b97cb1d4d7336b6c1928f58978f05b749
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 591b6666dbd1993e9106271b20b004e3d433ad4220c5ab75c0912026f7e9f756
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9B61027190020ABFEB14DF64CC85BBE77ACBF0A724F104609F825D61D0EB74AA84D7A0
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                                  • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                                                                                                                                                                                                  • API String ID: 0-1645009161
                                                                                                                                                                                                                                                  • Opcode ID: a7365d88f059aefa1f5464ce5295a87001f2e42523083406d336de5c164d28c9
                                                                                                                                                                                                                                                  • Instruction ID: df10d9ed2b38cd7402120ea73c2faa75a8f3f6ca9b364e49252391cd844681c5
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: a7365d88f059aefa1f5464ce5295a87001f2e42523083406d336de5c164d28c9
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6F810575600605ABDB21AF61DC52FEF3BB8AF16304F044024FD05AA2D2EB70DA95E7E5
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • CharLowerBuffW.USER32(?,?), ref: 00C83EF8
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C83F03
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C83F5A
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C83F98
                                                                                                                                                                                                                                                  • GetDriveTypeW.KERNEL32(?), ref: 00C83FD6
                                                                                                                                                                                                                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00C8401E
                                                                                                                                                                                                                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00C84059
                                                                                                                                                                                                                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00C84087
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                                                                                                                                                                                                                  • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                                                                                                                                                                                                  • API String ID: 1839972693-4113822522
                                                                                                                                                                                                                                                  • Opcode ID: 54ec5497d80372da3f5bc6ec2eca9677c6685a2be6c78f4577e87162ed4bf9d5
                                                                                                                                                                                                                                                  • Instruction ID: cc67d97e1ba7b2129a7f9e28207f1bf812ef88f3abc9e3628a041a94a854377d
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 54ec5497d80372da3f5bc6ec2eca9677c6685a2be6c78f4577e87162ed4bf9d5
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A471E3716043029FC710EF24C8809ABB7F4EF95758F40492DFAA597251EB31EE45EB91
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • LoadIconW.USER32(00000063), ref: 00C75A2E
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00C75A40
                                                                                                                                                                                                                                                  • SetWindowTextW.USER32(?,?), ref: 00C75A57
                                                                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003EA), ref: 00C75A6C
                                                                                                                                                                                                                                                  • SetWindowTextW.USER32(00000000,?), ref: 00C75A72
                                                                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003E9), ref: 00C75A82
                                                                                                                                                                                                                                                  • SetWindowTextW.USER32(00000000,?), ref: 00C75A88
                                                                                                                                                                                                                                                  • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00C75AA9
                                                                                                                                                                                                                                                  • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00C75AC3
                                                                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00C75ACC
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C75B33
                                                                                                                                                                                                                                                  • SetWindowTextW.USER32(?,?), ref: 00C75B6F
                                                                                                                                                                                                                                                  • GetDesktopWindow.USER32 ref: 00C75B75
                                                                                                                                                                                                                                                  • GetWindowRect.USER32(00000000), ref: 00C75B7C
                                                                                                                                                                                                                                                  • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00C75BD3
                                                                                                                                                                                                                                                  • GetClientRect.USER32(?,?), ref: 00C75BE0
                                                                                                                                                                                                                                                  • PostMessageW.USER32(?,00000005,00000000,?), ref: 00C75C05
                                                                                                                                                                                                                                                  • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00C75C2F
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 895679908-0
                                                                                                                                                                                                                                                  • Opcode ID: 5081271993cbc065a35dc6ec66285121f8a6a0d1117831e3be27de50ae1670fa
                                                                                                                                                                                                                                                  • Instruction ID: 629b699b4e3e19c9c5b2598afc6c9c9c3cfd6a60f0df3b77c742de448ce3e4a7
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5081271993cbc065a35dc6ec66285121f8a6a0d1117831e3be27de50ae1670fa
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1B718131900B09AFDB20DFA9CE85BAEBBF5FF48704F104918E556A35A0D7B5EA44CB50
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F89), ref: 00C8FE27
                                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F8A), ref: 00C8FE32
                                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 00C8FE3D
                                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F03), ref: 00C8FE48
                                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F8B), ref: 00C8FE53
                                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F01), ref: 00C8FE5E
                                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F81), ref: 00C8FE69
                                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F88), ref: 00C8FE74
                                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F80), ref: 00C8FE7F
                                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F86), ref: 00C8FE8A
                                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F83), ref: 00C8FE95
                                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F85), ref: 00C8FEA0
                                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F82), ref: 00C8FEAB
                                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F84), ref: 00C8FEB6
                                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F04), ref: 00C8FEC1
                                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 00C8FECC
                                                                                                                                                                                                                                                  • GetCursorInfo.USER32(?), ref: 00C8FEDC
                                                                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00C8FF1E
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Cursor$Load$ErrorInfoLast
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3215588206-0
                                                                                                                                                                                                                                                  • Opcode ID: 58a1ffa45c8ff729bfc1e334a6414ad7d094fccd1906839496d60e2beef865cd
                                                                                                                                                                                                                                                  • Instruction ID: 4f55e07ffb7f2c1b0a3f21c50fe60b89a651bb31f2f85386e87189ff19927923
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 58a1ffa45c8ff729bfc1e334a6414ad7d094fccd1906839496d60e2beef865cd
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: AA4161B0D043196ADB10DFBA8C8985EBFE8FF04354B50452AF119E7281DB78E9018F94
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00C300C6
                                                                                                                                                                                                                                                    • Part of subcall function 00C300ED: InitializeCriticalSectionAndSpinCount.KERNEL32(00CE070C,00000FA0,BCB53E78,?,?,?,?,00C523B3,000000FF), ref: 00C3011C
                                                                                                                                                                                                                                                    • Part of subcall function 00C300ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00C523B3,000000FF), ref: 00C30127
                                                                                                                                                                                                                                                    • Part of subcall function 00C300ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00C523B3,000000FF), ref: 00C30138
                                                                                                                                                                                                                                                    • Part of subcall function 00C300ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00C3014E
                                                                                                                                                                                                                                                    • Part of subcall function 00C300ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00C3015C
                                                                                                                                                                                                                                                    • Part of subcall function 00C300ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00C3016A
                                                                                                                                                                                                                                                    • Part of subcall function 00C300ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00C30195
                                                                                                                                                                                                                                                    • Part of subcall function 00C300ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00C301A0
                                                                                                                                                                                                                                                  • ___scrt_fastfail.LIBCMT ref: 00C300E7
                                                                                                                                                                                                                                                    • Part of subcall function 00C300A3: __onexit.LIBCMT ref: 00C300A9
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  • kernel32.dll, xrefs: 00C30133
                                                                                                                                                                                                                                                  • WakeAllConditionVariable, xrefs: 00C30162
                                                                                                                                                                                                                                                  • InitializeConditionVariable, xrefs: 00C30148
                                                                                                                                                                                                                                                  • SleepConditionVariableCS, xrefs: 00C30154
                                                                                                                                                                                                                                                  • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00C30122
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                                                                                                                                                                                                                  • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                                                                                                                                                                                  • API String ID: 66158676-1714406822
                                                                                                                                                                                                                                                  • Opcode ID: deb592b73c740bcc8cad521f44a0488b0b979e3ab8237a63cee572e48e46b0a6
                                                                                                                                                                                                                                                  • Instruction ID: dc6ece1f8418497ab6f2270070478a26bf25bcb62cdbdf7eb51f258f83a26e2c
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: deb592b73c740bcc8cad521f44a0488b0b979e3ab8237a63cee572e48e46b0a6
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: C2213833A507116FE7216FE4AC96B2E33E4EB06B65F20013EF901E7691DFB09C008A90
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: _wcslen
                                                                                                                                                                                                                                                  • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                                                                                                                                                                                                  • API String ID: 176396367-1603158881
                                                                                                                                                                                                                                                  • Opcode ID: 63ac9a01d1657a3ad7ca3453fe000aadcec2d504ba2169d874b1a502bfd9a511
                                                                                                                                                                                                                                                  • Instruction ID: 4fc390fe69ecf2fc44b4c771d03ba099afea422f4986e1818d7e50e6a679c811
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 63ac9a01d1657a3ad7ca3453fe000aadcec2d504ba2169d874b1a502bfd9a511
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 02E1F632A00556ABCB18DF78C8517EEBBB4BF44710F54C12AE46AB7240DB30AF85B790
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • CharLowerBuffW.USER32(00000000,00000000,00CACC08), ref: 00C84527
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C8453B
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C84599
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C845F4
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C8463F
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C846A7
                                                                                                                                                                                                                                                    • Part of subcall function 00C2F9F2: _wcslen.LIBCMT ref: 00C2F9FD
                                                                                                                                                                                                                                                  • GetDriveTypeW.KERNEL32(?,00CD6BF0,00000061), ref: 00C84743
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: _wcslen$BuffCharDriveLowerType
                                                                                                                                                                                                                                                  • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                                                                                                                                                                                  • API String ID: 2055661098-1000479233
                                                                                                                                                                                                                                                  • Opcode ID: db74fe15780fa5ed619ab20b41e6db826be47000b2055c2ac5ffb17d4b3502fe
                                                                                                                                                                                                                                                  • Instruction ID: f6ab543bb81330903e82af0acdbcee9e7f7bde532b73e82030ea571f59842830
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: db74fe15780fa5ed619ab20b41e6db826be47000b2055c2ac5ffb17d4b3502fe
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: F7B126716083039FC718EF28C890A6EB7E5BFA6728F50491DF4A6C7291E730D944DB96
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,00CACC08), ref: 00C940BB
                                                                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00C940CD
                                                                                                                                                                                                                                                  • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,00CACC08), ref: 00C940F2
                                                                                                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000,?,00CACC08), ref: 00C9413E
                                                                                                                                                                                                                                                  • StringFromGUID2.OLE32(?,?,00000028,?,00CACC08), ref: 00C941A8
                                                                                                                                                                                                                                                  • SysFreeString.OLEAUT32(00000009), ref: 00C94262
                                                                                                                                                                                                                                                  • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00C942C8
                                                                                                                                                                                                                                                  • SysFreeString.OLEAUT32(?), ref: 00C942F2
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                                                                                                                                                                                                                                  • String ID: GetModuleHandleExW$kernel32.dll
                                                                                                                                                                                                                                                  • API String ID: 354098117-199464113
                                                                                                                                                                                                                                                  • Opcode ID: a560f222bbe46094f24da11b642d90ecd3116f40c0fc4c70039ef38382731d42
                                                                                                                                                                                                                                                  • Instruction ID: 8e56d560d019b69a0d488a07f96ea99660a2ae17fb1a6be11fc9fa33efcbe951
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: a560f222bbe46094f24da11b642d90ecd3116f40c0fc4c70039ef38382731d42
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 61123C75A00115EFDF18CF94C888EAEBBB5FF49318F248098E9159B251D731EE46CBA0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetMenuItemCount.USER32(00CE1990), ref: 00C52F8D
                                                                                                                                                                                                                                                  • GetMenuItemCount.USER32(00CE1990), ref: 00C5303D
                                                                                                                                                                                                                                                  • GetCursorPos.USER32(?), ref: 00C53081
                                                                                                                                                                                                                                                  • SetForegroundWindow.USER32(00000000), ref: 00C5308A
                                                                                                                                                                                                                                                  • TrackPopupMenuEx.USER32(00CE1990,00000000,?,00000000,00000000,00000000), ref: 00C5309D
                                                                                                                                                                                                                                                  • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00C530A9
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                                                                                                                                                                                                                  • String ID: 0
                                                                                                                                                                                                                                                  • API String ID: 36266755-4108050209
                                                                                                                                                                                                                                                  • Opcode ID: 9e73d7d1e97314fc5aa7b42ecc75f6d099d87bc111e02d4884aa762f6dfb0b88
                                                                                                                                                                                                                                                  • Instruction ID: f8d78dd76491d8501dbe58242d26f9e13917a574817d6b82d396b8e455f29db4
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9e73d7d1e97314fc5aa7b42ecc75f6d099d87bc111e02d4884aa762f6dfb0b88
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: F5716E34600255BEEB21DF64DC89F9EBFA4FF02368F204206F924661E1C7B1AE94E754
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • DestroyWindow.USER32(00000000,?), ref: 00CA6DEB
                                                                                                                                                                                                                                                    • Part of subcall function 00C16B57: _wcslen.LIBCMT ref: 00C16B6A
                                                                                                                                                                                                                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00CA6E5F
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00CA6E81
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00CA6E94
                                                                                                                                                                                                                                                  • DestroyWindow.USER32(?), ref: 00CA6EB5
                                                                                                                                                                                                                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00C10000,00000000), ref: 00CA6EE4
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00CA6EFD
                                                                                                                                                                                                                                                  • GetDesktopWindow.USER32 ref: 00CA6F16
                                                                                                                                                                                                                                                  • GetWindowRect.USER32(00000000), ref: 00CA6F1D
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00CA6F35
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00CA6F4D
                                                                                                                                                                                                                                                    • Part of subcall function 00C29944: GetWindowLongW.USER32(?,000000EB), ref: 00C29952
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                                                                                                                                                                                                                  • String ID: 0$tooltips_class32
                                                                                                                                                                                                                                                  • API String ID: 2429346358-3619404913
                                                                                                                                                                                                                                                  • Opcode ID: e5eb1bb84b3a6f2eb479b38a84bf083fac208f66559ab0e6697f179613b62cde
                                                                                                                                                                                                                                                  • Instruction ID: d86adaad1d91b6df57930090250a799a0e0131a6fd329c620001859ce7f620d9
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e5eb1bb84b3a6f2eb479b38a84bf083fac208f66559ab0e6697f179613b62cde
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 45715874144245AFDB21CF58DC84FAABBE9FB8A308F08051EF999872A1C771AA45DB11
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C29BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00C29BB2
                                                                                                                                                                                                                                                  • DragQueryPoint.SHELL32(?,?), ref: 00CA9147
                                                                                                                                                                                                                                                    • Part of subcall function 00CA7674: ClientToScreen.USER32(?,?), ref: 00CA769A
                                                                                                                                                                                                                                                    • Part of subcall function 00CA7674: GetWindowRect.USER32(?,?), ref: 00CA7710
                                                                                                                                                                                                                                                    • Part of subcall function 00CA7674: PtInRect.USER32(?,?,00CA8B89), ref: 00CA7720
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 00CA91B0
                                                                                                                                                                                                                                                  • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00CA91BB
                                                                                                                                                                                                                                                  • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00CA91DE
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00CA9225
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 00CA923E
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000000B1,?,?), ref: 00CA9255
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000000B1,?,?), ref: 00CA9277
                                                                                                                                                                                                                                                  • DragFinish.SHELL32(?), ref: 00CA927E
                                                                                                                                                                                                                                                  • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00CA9371
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                                                                                                                                                                                                                  • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                                                                                                                                                                                                  • API String ID: 221274066-3440237614
                                                                                                                                                                                                                                                  • Opcode ID: 3eab43e114240217e93f5e1db1356bc478af007ac0dd7a030a7f0a74c23b910b
                                                                                                                                                                                                                                                  • Instruction ID: f340fa3b9d9a7f562813b4643dafe99d0cdad8092e4324f0a27b49054e7c89a0
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3eab43e114240217e93f5e1db1356bc478af007ac0dd7a030a7f0a74c23b910b
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 32617F71108301AFD701DF94DC95EAFBBE8EF8A754F00091EF595931A1DB309A45DB52
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00C8C4B0
                                                                                                                                                                                                                                                  • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00C8C4C3
                                                                                                                                                                                                                                                  • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00C8C4D7
                                                                                                                                                                                                                                                  • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00C8C4F0
                                                                                                                                                                                                                                                  • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00C8C533
                                                                                                                                                                                                                                                  • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00C8C549
                                                                                                                                                                                                                                                  • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00C8C554
                                                                                                                                                                                                                                                  • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00C8C584
                                                                                                                                                                                                                                                  • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00C8C5DC
                                                                                                                                                                                                                                                  • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00C8C5F0
                                                                                                                                                                                                                                                  • InternetCloseHandle.WININET(00000000), ref: 00C8C5FB
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3800310941-3916222277
                                                                                                                                                                                                                                                  • Opcode ID: 33b3c52a32e8c866b7b33777e47b1a5cea4066f15159bca8be76418d4d8c1ce6
                                                                                                                                                                                                                                                  • Instruction ID: 6ad501ce9e8873a833ac2a1e92689d190feff01f6e4a2d812fc46e7d1921f50a
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 33b3c52a32e8c866b7b33777e47b1a5cea4066f15159bca8be76418d4d8c1ce6
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6C513BB1500608BFDB21AF61C9C8BBB7BBCEB09758F004419F955D7650DB34EA44AB74
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00CA8592
                                                                                                                                                                                                                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 00CA85A2
                                                                                                                                                                                                                                                  • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00CA85AD
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00CA85BA
                                                                                                                                                                                                                                                  • GlobalLock.KERNEL32(00000000), ref: 00CA85C8
                                                                                                                                                                                                                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00CA85D7
                                                                                                                                                                                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00CA85E0
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00CA85E7
                                                                                                                                                                                                                                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00CA85F8
                                                                                                                                                                                                                                                  • OleLoadPicture.OLEAUT32(?,00000000,00000000,00CAFC38,?), ref: 00CA8611
                                                                                                                                                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 00CA8621
                                                                                                                                                                                                                                                  • GetObjectW.GDI32(?,00000018,000000FF), ref: 00CA8641
                                                                                                                                                                                                                                                  • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00CA8671
                                                                                                                                                                                                                                                  • DeleteObject.GDI32(00000000), ref: 00CA8699
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00CA86AF
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3840717409-0
                                                                                                                                                                                                                                                  • Opcode ID: cc9cf16b65e88e12cd5b2e3fd1d7c28602beecd6a3ff87cd97549ca9c752a4e6
                                                                                                                                                                                                                                                  • Instruction ID: 1ffe2f0452f7b42b5dd65a8ca35e6a6f798675042cb268a55b37665f26dcac73
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: cc9cf16b65e88e12cd5b2e3fd1d7c28602beecd6a3ff87cd97549ca9c752a4e6
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 02410775600209AFDB119FA5CC88FAE7BB8FF8AB19F104159F915E7260DB309A05CB60
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • VariantInit.OLEAUT32(00000000), ref: 00C81502
                                                                                                                                                                                                                                                  • VariantCopy.OLEAUT32(?,?), ref: 00C8150B
                                                                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 00C81517
                                                                                                                                                                                                                                                  • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00C815FB
                                                                                                                                                                                                                                                  • VarR8FromDec.OLEAUT32(?,?), ref: 00C81657
                                                                                                                                                                                                                                                  • VariantInit.OLEAUT32(?), ref: 00C81708
                                                                                                                                                                                                                                                  • SysFreeString.OLEAUT32(?), ref: 00C8178C
                                                                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 00C817D8
                                                                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 00C817E7
                                                                                                                                                                                                                                                  • VariantInit.OLEAUT32(00000000), ref: 00C81823
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                                                                                                                                                                                                                  • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                                                                                                                                                                                                                  • API String ID: 1234038744-3931177956
                                                                                                                                                                                                                                                  • Opcode ID: 111ff14c344e83893450526a8d091ff917d0b00e973a0c89859f6556af2421b6
                                                                                                                                                                                                                                                  • Instruction ID: 578080c336b441c3062679b0290ddfb760ce8036f2f7355a43fa7e383d430df2
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 111ff14c344e83893450526a8d091ff917d0b00e973a0c89859f6556af2421b6
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A6D10531600119DBDB10AF66E885B7DB7F9BF46708F18806AFC46AB580DB30DD42EB65
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C19CB3: _wcslen.LIBCMT ref: 00C19CBD
                                                                                                                                                                                                                                                    • Part of subcall function 00C9C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C9B6AE,?,?), ref: 00C9C9B5
                                                                                                                                                                                                                                                    • Part of subcall function 00C9C998: _wcslen.LIBCMT ref: 00C9C9F1
                                                                                                                                                                                                                                                    • Part of subcall function 00C9C998: _wcslen.LIBCMT ref: 00C9CA68
                                                                                                                                                                                                                                                    • Part of subcall function 00C9C998: _wcslen.LIBCMT ref: 00C9CA9E
                                                                                                                                                                                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C9B6F4
                                                                                                                                                                                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00C9B772
                                                                                                                                                                                                                                                  • RegDeleteValueW.ADVAPI32(?,?), ref: 00C9B80A
                                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 00C9B87E
                                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 00C9B89C
                                                                                                                                                                                                                                                  • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00C9B8F2
                                                                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00C9B904
                                                                                                                                                                                                                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00C9B922
                                                                                                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 00C9B983
                                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00C9B994
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                                                                                                                                                                                                                  • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                                                                                                                                                                  • API String ID: 146587525-4033151799
                                                                                                                                                                                                                                                  • Opcode ID: 84f954c0553f23750e674cfe74e9e1b025764a25bffaaf0199cbb780552fcb8e
                                                                                                                                                                                                                                                  • Instruction ID: 7dbafb7a622aa88fc536aa8fcf835baf4d861a4881fcad9d2c8b205f85bc94fd
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 84f954c0553f23750e674cfe74e9e1b025764a25bffaaf0199cbb780552fcb8e
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: E5C19E30204201AFDB10DF14D598F2ABBE5FF85308F15859CF5AA4B2A2CB71ED86DB91
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetDC.USER32(00000000), ref: 00C925D8
                                                                                                                                                                                                                                                  • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00C925E8
                                                                                                                                                                                                                                                  • CreateCompatibleDC.GDI32(?), ref: 00C925F4
                                                                                                                                                                                                                                                  • SelectObject.GDI32(00000000,?), ref: 00C92601
                                                                                                                                                                                                                                                  • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00C9266D
                                                                                                                                                                                                                                                  • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00C926AC
                                                                                                                                                                                                                                                  • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00C926D0
                                                                                                                                                                                                                                                  • SelectObject.GDI32(?,?), ref: 00C926D8
                                                                                                                                                                                                                                                  • DeleteObject.GDI32(?), ref: 00C926E1
                                                                                                                                                                                                                                                  • DeleteDC.GDI32(?), ref: 00C926E8
                                                                                                                                                                                                                                                  • ReleaseDC.USER32(00000000,?), ref: 00C926F3
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                                                                                                                                                                                                  • String ID: (
                                                                                                                                                                                                                                                  • API String ID: 2598888154-3887548279
                                                                                                                                                                                                                                                  • Opcode ID: 689fda5f3288e50256f411da78bc9afdde8fab9578464bfc7bc985c5813a7c0d
                                                                                                                                                                                                                                                  • Instruction ID: 60dda1baba4a847382234595482497a9e7cb0f4389b0a6071f432e4d452fbadd
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 689fda5f3288e50256f411da78bc9afdde8fab9578464bfc7bc985c5813a7c0d
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6061E475E00219EFCF05CFA4D984AAEBBF5FF48314F208529E955A7250D770A941DF90
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • ___free_lconv_mon.LIBCMT ref: 00C4DAA1
                                                                                                                                                                                                                                                    • Part of subcall function 00C4D63C: _free.LIBCMT ref: 00C4D659
                                                                                                                                                                                                                                                    • Part of subcall function 00C4D63C: _free.LIBCMT ref: 00C4D66B
                                                                                                                                                                                                                                                    • Part of subcall function 00C4D63C: _free.LIBCMT ref: 00C4D67D
                                                                                                                                                                                                                                                    • Part of subcall function 00C4D63C: _free.LIBCMT ref: 00C4D68F
                                                                                                                                                                                                                                                    • Part of subcall function 00C4D63C: _free.LIBCMT ref: 00C4D6A1
                                                                                                                                                                                                                                                    • Part of subcall function 00C4D63C: _free.LIBCMT ref: 00C4D6B3
                                                                                                                                                                                                                                                    • Part of subcall function 00C4D63C: _free.LIBCMT ref: 00C4D6C5
                                                                                                                                                                                                                                                    • Part of subcall function 00C4D63C: _free.LIBCMT ref: 00C4D6D7
                                                                                                                                                                                                                                                    • Part of subcall function 00C4D63C: _free.LIBCMT ref: 00C4D6E9
                                                                                                                                                                                                                                                    • Part of subcall function 00C4D63C: _free.LIBCMT ref: 00C4D6FB
                                                                                                                                                                                                                                                    • Part of subcall function 00C4D63C: _free.LIBCMT ref: 00C4D70D
                                                                                                                                                                                                                                                    • Part of subcall function 00C4D63C: _free.LIBCMT ref: 00C4D71F
                                                                                                                                                                                                                                                    • Part of subcall function 00C4D63C: _free.LIBCMT ref: 00C4D731
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C4DA96
                                                                                                                                                                                                                                                    • Part of subcall function 00C429C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00C4D7D1,00000000,00000000,00000000,00000000,?,00C4D7F8,00000000,00000007,00000000,?,00C4DBF5,00000000), ref: 00C429DE
                                                                                                                                                                                                                                                    • Part of subcall function 00C429C8: GetLastError.KERNEL32(00000000,?,00C4D7D1,00000000,00000000,00000000,00000000,?,00C4D7F8,00000000,00000007,00000000,?,00C4DBF5,00000000,00000000), ref: 00C429F0
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C4DAB8
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C4DACD
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C4DAD8
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C4DAFA
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C4DB0D
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C4DB1B
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C4DB26
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C4DB5E
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C4DB65
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C4DB82
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C4DB9A
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 161543041-0
                                                                                                                                                                                                                                                  • Opcode ID: 7a586c190c7a38f96f4f0b8a1e4d92889406a6418c3f1f75c17357e2184dbbe4
                                                                                                                                                                                                                                                  • Instruction ID: 6a6b1dbf659a48bfbfe750638e9b256610eef0ec29d6ebe81b2caf75d9e200dc
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7a586c190c7a38f96f4f0b8a1e4d92889406a6418c3f1f75c17357e2184dbbe4
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A23170316047059FEB22BA39E846B5A77E9FF10310F55441AF46AD7291DF31EE80E720
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetClassNameW.USER32(?,?,00000100), ref: 00C7369C
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C736A7
                                                                                                                                                                                                                                                  • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00C73797
                                                                                                                                                                                                                                                  • GetClassNameW.USER32(?,?,00000400), ref: 00C7380C
                                                                                                                                                                                                                                                  • GetDlgCtrlID.USER32(?), ref: 00C7385D
                                                                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00C73882
                                                                                                                                                                                                                                                  • GetParent.USER32(?), ref: 00C738A0
                                                                                                                                                                                                                                                  • ScreenToClient.USER32(00000000), ref: 00C738A7
                                                                                                                                                                                                                                                  • GetClassNameW.USER32(?,?,00000100), ref: 00C73921
                                                                                                                                                                                                                                                  • GetWindowTextW.USER32(?,?,00000400), ref: 00C7395D
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                                                                                                                                                                                                                  • String ID: %s%u
                                                                                                                                                                                                                                                  • API String ID: 4010501982-679674701
                                                                                                                                                                                                                                                  • Opcode ID: 212ad9d4ef94725f2f15dc11627f7572663d611d24247f57b1a034da9c919a49
                                                                                                                                                                                                                                                  • Instruction ID: c8fc642e309b90861957ddb370a27d14f283ea504a7f3fbac825ab68928e8970
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 212ad9d4ef94725f2f15dc11627f7572663d611d24247f57b1a034da9c919a49
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0091BF71204646AFD719DF24C885BAAF7A8FF44354F00C629FAADD2190DB30EB45DBA1
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetClassNameW.USER32(?,?,00000400), ref: 00C74994
                                                                                                                                                                                                                                                  • GetWindowTextW.USER32(?,?,00000400), ref: 00C749DA
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C749EB
                                                                                                                                                                                                                                                  • CharUpperBuffW.USER32(?,00000000), ref: 00C749F7
                                                                                                                                                                                                                                                  • _wcsstr.LIBVCRUNTIME ref: 00C74A2C
                                                                                                                                                                                                                                                  • GetClassNameW.USER32(00000018,?,00000400), ref: 00C74A64
                                                                                                                                                                                                                                                  • GetWindowTextW.USER32(?,?,00000400), ref: 00C74A9D
                                                                                                                                                                                                                                                  • GetClassNameW.USER32(00000018,?,00000400), ref: 00C74AE6
                                                                                                                                                                                                                                                  • GetClassNameW.USER32(?,?,00000400), ref: 00C74B20
                                                                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00C74B8B
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                                                                                                                                                                                                                  • String ID: ThumbnailClass
                                                                                                                                                                                                                                                  • API String ID: 1311036022-1241985126
                                                                                                                                                                                                                                                  • Opcode ID: f3fda545cef709739035f171468c5c6e480d5980847bb3d79bfbfd68ae86569c
                                                                                                                                                                                                                                                  • Instruction ID: e6ec6619e052fbc965b7fa7ed5db851164746e3ff46e20486ff06b0be274f062
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: f3fda545cef709739035f171468c5c6e480d5980847bb3d79bfbfd68ae86569c
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3791DE311042059FDB09DF14C985FAAB7E8FF84314F04C46AFD999A096EB30EE45DBA1
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(00CE1990,000000FF,00000000,00000030), ref: 00C7BFAC
                                                                                                                                                                                                                                                  • SetMenuItemInfoW.USER32(00CE1990,00000004,00000000,00000030), ref: 00C7BFE1
                                                                                                                                                                                                                                                  • Sleep.KERNEL32(000001F4), ref: 00C7BFF3
                                                                                                                                                                                                                                                  • GetMenuItemCount.USER32(?), ref: 00C7C039
                                                                                                                                                                                                                                                  • GetMenuItemID.USER32(?,00000000), ref: 00C7C056
                                                                                                                                                                                                                                                  • GetMenuItemID.USER32(?,-00000001), ref: 00C7C082
                                                                                                                                                                                                                                                  • GetMenuItemID.USER32(?,?), ref: 00C7C0C9
                                                                                                                                                                                                                                                  • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00C7C10F
                                                                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C7C124
                                                                                                                                                                                                                                                  • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C7C145
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ItemMenu$Info$CheckCountRadioSleep
                                                                                                                                                                                                                                                  • String ID: 0
                                                                                                                                                                                                                                                  • API String ID: 1460738036-4108050209
                                                                                                                                                                                                                                                  • Opcode ID: 29d8ea97299ffd4e9b7c3aa5cda5014bf45fe16769e9e45a697fdd7d4311802c
                                                                                                                                                                                                                                                  • Instruction ID: d87e45b06a040b319179fe10ffa8c2d51e68b1821a9fec77ab8058bd6bc577c9
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 29d8ea97299ffd4e9b7c3aa5cda5014bf45fe16769e9e45a697fdd7d4311802c
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: D36181B0900246AFDF11CF64DDC8BEE7BB8EB05344F448069F829A3291D735AE55DBA0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00C9CC64
                                                                                                                                                                                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00C9CC8D
                                                                                                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00C9CD48
                                                                                                                                                                                                                                                    • Part of subcall function 00C9CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00C9CCAA
                                                                                                                                                                                                                                                    • Part of subcall function 00C9CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00C9CCBD
                                                                                                                                                                                                                                                    • Part of subcall function 00C9CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00C9CCCF
                                                                                                                                                                                                                                                    • Part of subcall function 00C9CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00C9CD05
                                                                                                                                                                                                                                                    • Part of subcall function 00C9CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00C9CD28
                                                                                                                                                                                                                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00C9CCF3
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                                                                                                                                                                                                                  • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                                                                                                                                                                  • API String ID: 2734957052-4033151799
                                                                                                                                                                                                                                                  • Opcode ID: 6722d6172f1897dbd40edaefc16621697a5eaef7f66158883e1b421975253819
                                                                                                                                                                                                                                                  • Instruction ID: a905bf10e1819524fcdea12ec4d076c2d4db75ed44ab4519549080ccba34fb3a
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6722d6172f1897dbd40edaefc16621697a5eaef7f66158883e1b421975253819
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 33315A72A01129BBDB208B95DCCCFFFBB7CEF46754F000165E916E3240DA349A45AAA0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00C83D40
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C83D6D
                                                                                                                                                                                                                                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 00C83D9D
                                                                                                                                                                                                                                                  • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00C83DBE
                                                                                                                                                                                                                                                  • RemoveDirectoryW.KERNEL32(?), ref: 00C83DCE
                                                                                                                                                                                                                                                  • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00C83E55
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00C83E60
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00C83E6B
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                                                                                                                                                                                                                  • String ID: :$\$\??\%s
                                                                                                                                                                                                                                                  • API String ID: 1149970189-3457252023
                                                                                                                                                                                                                                                  • Opcode ID: b949715484b8aa82e9e19e7c593f09f7dce30f2154ee56270ca11034925845a1
                                                                                                                                                                                                                                                  • Instruction ID: 6583d6a8da25c6bc06c0efb22ab7983ba91bea6fea967678d3fd699dcdf7a22f
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: b949715484b8aa82e9e19e7c593f09f7dce30f2154ee56270ca11034925845a1
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2B31D471A10249ABDB21AFA0DC88FEF37BCEF89B04F1041B6F915D6160EB7497448B24
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • timeGetTime.WINMM ref: 00C7E6B4
                                                                                                                                                                                                                                                    • Part of subcall function 00C2E551: timeGetTime.WINMM(?,?,00C7E6D4), ref: 00C2E555
                                                                                                                                                                                                                                                  • Sleep.KERNEL32(0000000A), ref: 00C7E6E1
                                                                                                                                                                                                                                                  • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 00C7E705
                                                                                                                                                                                                                                                  • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00C7E727
                                                                                                                                                                                                                                                  • SetActiveWindow.USER32 ref: 00C7E746
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00C7E754
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 00C7E773
                                                                                                                                                                                                                                                  • Sleep.KERNEL32(000000FA), ref: 00C7E77E
                                                                                                                                                                                                                                                  • IsWindow.USER32 ref: 00C7E78A
                                                                                                                                                                                                                                                  • EndDialog.USER32(00000000), ref: 00C7E79B
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                                                                                                                                                                                  • String ID: BUTTON
                                                                                                                                                                                                                                                  • API String ID: 1194449130-3405671355
                                                                                                                                                                                                                                                  • Opcode ID: 8a54efd2d907f33047ea16b0b064b2578400f35fe1fe094da5b3de1a18dec356
                                                                                                                                                                                                                                                  • Instruction ID: 2a3e38cae76345f5b234d2deb4d795bcd7507f94f76381b4705683ee6376d165
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8a54efd2d907f33047ea16b0b064b2578400f35fe1fe094da5b3de1a18dec356
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: D1218172200685AFEB009F64ECC9B2D3B6DF75A34DB109465F919C61B1DBB1AD10AB24
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C19CB3: _wcslen.LIBCMT ref: 00C19CBD
                                                                                                                                                                                                                                                  • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00C7EA5D
                                                                                                                                                                                                                                                  • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00C7EA73
                                                                                                                                                                                                                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00C7EA84
                                                                                                                                                                                                                                                  • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00C7EA96
                                                                                                                                                                                                                                                  • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00C7EAA7
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: SendString$_wcslen
                                                                                                                                                                                                                                                  • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                                                                                                                                                                                  • API String ID: 2420728520-1007645807
                                                                                                                                                                                                                                                  • Opcode ID: ca4f23a76d418289fe5c36651e9316831f2e909b810548123d53036849237fe3
                                                                                                                                                                                                                                                  • Instruction ID: a7c514e042fcbb74b104ea568616d60112e44c5bc082ac0512481c69173079a7
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: ca4f23a76d418289fe5c36651e9316831f2e909b810548123d53036849237fe3
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6111A331A9026979D720E7A1DC5AEFF6B7CFBD6B10F40043AB911A21D0EE701A45E5B0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetKeyboardState.USER32(?), ref: 00C7A012
                                                                                                                                                                                                                                                  • SetKeyboardState.USER32(?), ref: 00C7A07D
                                                                                                                                                                                                                                                  • GetAsyncKeyState.USER32(000000A0), ref: 00C7A09D
                                                                                                                                                                                                                                                  • GetKeyState.USER32(000000A0), ref: 00C7A0B4
                                                                                                                                                                                                                                                  • GetAsyncKeyState.USER32(000000A1), ref: 00C7A0E3
                                                                                                                                                                                                                                                  • GetKeyState.USER32(000000A1), ref: 00C7A0F4
                                                                                                                                                                                                                                                  • GetAsyncKeyState.USER32(00000011), ref: 00C7A120
                                                                                                                                                                                                                                                  • GetKeyState.USER32(00000011), ref: 00C7A12E
                                                                                                                                                                                                                                                  • GetAsyncKeyState.USER32(00000012), ref: 00C7A157
                                                                                                                                                                                                                                                  • GetKeyState.USER32(00000012), ref: 00C7A165
                                                                                                                                                                                                                                                  • GetAsyncKeyState.USER32(0000005B), ref: 00C7A18E
                                                                                                                                                                                                                                                  • GetKeyState.USER32(0000005B), ref: 00C7A19C
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: State$Async$Keyboard
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 541375521-0
                                                                                                                                                                                                                                                  • Opcode ID: 920f95075aa82910c0af466f95aec268054a540b5d9206ffa5bf1c2b3f70a513
                                                                                                                                                                                                                                                  • Instruction ID: 567ea62cbb5ddd1e824a7e1a4690ed05f2c39aeeeef6ac44efe0b21e4148fa84
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 920f95075aa82910c0af466f95aec268054a540b5d9206ffa5bf1c2b3f70a513
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: EF510930A047886AFB35DBB088117EEBFB49F42380F48C589D5DA571C3DA64AB4CC762
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetDlgItem.USER32(?,00000001), ref: 00C75CE2
                                                                                                                                                                                                                                                  • GetWindowRect.USER32(00000000,?), ref: 00C75CFB
                                                                                                                                                                                                                                                  • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00C75D59
                                                                                                                                                                                                                                                  • GetDlgItem.USER32(?,00000002), ref: 00C75D69
                                                                                                                                                                                                                                                  • GetWindowRect.USER32(00000000,?), ref: 00C75D7B
                                                                                                                                                                                                                                                  • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00C75DCF
                                                                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003E9), ref: 00C75DDD
                                                                                                                                                                                                                                                  • GetWindowRect.USER32(00000000,?), ref: 00C75DEF
                                                                                                                                                                                                                                                  • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00C75E31
                                                                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003EA), ref: 00C75E44
                                                                                                                                                                                                                                                  • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00C75E5A
                                                                                                                                                                                                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00C75E67
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Window$ItemMoveRect$Invalidate
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3096461208-0
                                                                                                                                                                                                                                                  • Opcode ID: 345eae9145b27f7177b5678c9ae203741df98884f4669f71539e27a0cb0fedd2
                                                                                                                                                                                                                                                  • Instruction ID: 7bf9606649955f02c433e94f2a2befbd22d74fcae37cf4c208012aa9e3fe7c3b
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 345eae9145b27f7177b5678c9ae203741df98884f4669f71539e27a0cb0fedd2
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4751FCB1A00609AFDB18CF68DD89BAEBBB5FB48304F148129F919E7290D7709E04CB50
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C28F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00C28BE8,?,00000000,?,?,?,?,00C28BBA,00000000,?), ref: 00C28FC5
                                                                                                                                                                                                                                                  • DestroyWindow.USER32(?), ref: 00C28C81
                                                                                                                                                                                                                                                  • KillTimer.USER32(00000000,?,?,?,?,00C28BBA,00000000,?), ref: 00C28D1B
                                                                                                                                                                                                                                                  • DestroyAcceleratorTable.USER32(00000000), ref: 00C66973
                                                                                                                                                                                                                                                  • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00C28BBA,00000000,?), ref: 00C669A1
                                                                                                                                                                                                                                                  • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00C28BBA,00000000,?), ref: 00C669B8
                                                                                                                                                                                                                                                  • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00C28BBA,00000000), ref: 00C669D4
                                                                                                                                                                                                                                                  • DeleteObject.GDI32(00000000), ref: 00C669E6
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 641708696-0
                                                                                                                                                                                                                                                  • Opcode ID: 878d2236889c28def3ee0062efcce7198f7d29a820c5d6a395cb46c4ec2c65c8
                                                                                                                                                                                                                                                  • Instruction ID: e275035b53e19a08f8c6f69369cb69bdfdb41530ead4e55965608bf09897142d
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 878d2236889c28def3ee0062efcce7198f7d29a820c5d6a395cb46c4ec2c65c8
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1F61DE31102660DFCB319F15EA88B2DB7F1FB41316F18451CE4529B9A1CB35AEA8DF90
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C29944: GetWindowLongW.USER32(?,000000EB), ref: 00C29952
                                                                                                                                                                                                                                                  • GetSysColor.USER32(0000000F), ref: 00C29862
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ColorLongWindow
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 259745315-0
                                                                                                                                                                                                                                                  • Opcode ID: 74e8f57b13ea6391be7c2063f9e78262124b49dcac3a33a3daa460d5b5abd0eb
                                                                                                                                                                                                                                                  • Instruction ID: c4b058898274c53da6d7692891be58e32671e8e4c34b0520e5c188438fd015d9
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 74e8f57b13ea6391be7c2063f9e78262124b49dcac3a33a3daa460d5b5abd0eb
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 42418031504650AFDB249F38AC88BBD3BA5EB17334F184655FAB68B2E1D7319D42DB10
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,00C5F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00C79717
                                                                                                                                                                                                                                                  • LoadStringW.USER32(00000000,?,00C5F7F8,00000001), ref: 00C79720
                                                                                                                                                                                                                                                    • Part of subcall function 00C19CB3: _wcslen.LIBCMT ref: 00C19CBD
                                                                                                                                                                                                                                                  • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00C5F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00C79742
                                                                                                                                                                                                                                                  • LoadStringW.USER32(00000000,?,00C5F7F8,00000001), ref: 00C79745
                                                                                                                                                                                                                                                  • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00C79866
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: HandleLoadModuleString$Message_wcslen
                                                                                                                                                                                                                                                  • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                                                                                                                                                                                                  • API String ID: 747408836-2268648507
                                                                                                                                                                                                                                                  • Opcode ID: 2d9d8c3ba8fb0f24886e9edef65520cc5c0ffbc0c55692d71d4936828ee31492
                                                                                                                                                                                                                                                  • Instruction ID: 5df18d39f75666573171133f81256eeee682000752cd680f28badc681bb8546d
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2d9d8c3ba8fb0f24886e9edef65520cc5c0ffbc0c55692d71d4936828ee31492
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: BA415371800109AADB04EBD0CD96EEE7778EF56344F504025F605720A1EB356F89EB61
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C16B57: _wcslen.LIBCMT ref: 00C16B6A
                                                                                                                                                                                                                                                  • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00C707A2
                                                                                                                                                                                                                                                  • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00C707BE
                                                                                                                                                                                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00C707DA
                                                                                                                                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00C70804
                                                                                                                                                                                                                                                  • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00C7082C
                                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00C70837
                                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00C7083C
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                                                                                                                                                                                                                  • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                                                                                                                                                                                  • API String ID: 323675364-22481851
                                                                                                                                                                                                                                                  • Opcode ID: b94a83fd571a687d4e8da71ac219e29798f64014874275ca99f4ccdb46c5273e
                                                                                                                                                                                                                                                  • Instruction ID: 49098b4d2aa2fddd8ca0137db67d7b47b794ac9d87ad3d316560e9afd4556b4c
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: b94a83fd571a687d4e8da71ac219e29798f64014874275ca99f4ccdb46c5273e
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 65413872C10228EBDF15EBA4DC95DEDB778FF05354F14412AE915A31A0EB30AE45EBA0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00CA403B
                                                                                                                                                                                                                                                  • CreateCompatibleDC.GDI32(00000000), ref: 00CA4042
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00CA4055
                                                                                                                                                                                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00CA405D
                                                                                                                                                                                                                                                  • GetPixel.GDI32(00000000,00000000,00000000), ref: 00CA4068
                                                                                                                                                                                                                                                  • DeleteDC.GDI32(00000000), ref: 00CA4072
                                                                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000EC), ref: 00CA407C
                                                                                                                                                                                                                                                  • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 00CA4092
                                                                                                                                                                                                                                                  • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 00CA409E
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                                                                                                                                                                                                  • String ID: static
                                                                                                                                                                                                                                                  • API String ID: 2559357485-2160076837
                                                                                                                                                                                                                                                  • Opcode ID: e5160b163532744e5b3ac05cdc8737e9091262f78e0e1f8f105916060eca90c0
                                                                                                                                                                                                                                                  • Instruction ID: 0510077958a3c29f502f0b31a625cb516eb51e344f61da0951e7bf5b37da3037
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e5160b163532744e5b3ac05cdc8737e9091262f78e0e1f8f105916060eca90c0
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 48316E3250121AAFDF219FA4DC49FDE3BA8EF0E328F110211FA25E61A0C775D950EB94
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • VariantInit.OLEAUT32(?), ref: 00C93C5C
                                                                                                                                                                                                                                                  • CoInitialize.OLE32(00000000), ref: 00C93C8A
                                                                                                                                                                                                                                                  • CoUninitialize.OLE32 ref: 00C93C94
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C93D2D
                                                                                                                                                                                                                                                  • GetRunningObjectTable.OLE32(00000000,?), ref: 00C93DB1
                                                                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000001,00000029), ref: 00C93ED5
                                                                                                                                                                                                                                                  • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00C93F0E
                                                                                                                                                                                                                                                  • CoGetObject.OLE32(?,00000000,00CAFB98,?), ref: 00C93F2D
                                                                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000000), ref: 00C93F40
                                                                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00C93FC4
                                                                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 00C93FD8
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 429561992-0
                                                                                                                                                                                                                                                  • Opcode ID: 01f840746c1dbae1b0c6bc7b8ad4e9145ecd7a194db7e422ca5fcded27130512
                                                                                                                                                                                                                                                  • Instruction ID: 72d81d80778eb961253ffd01371ee3c4760cf889bb47a747c3a6247f8db6d95b
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 01f840746c1dbae1b0c6bc7b8ad4e9145ecd7a194db7e422ca5fcded27130512
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 02C146716083459FDB00DF68C88892BB7E9FF89748F10495DF99A9B250DB30EE45CB52
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • CoInitialize.OLE32(00000000), ref: 00C87AF3
                                                                                                                                                                                                                                                  • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00C87B8F
                                                                                                                                                                                                                                                  • SHGetDesktopFolder.SHELL32(?), ref: 00C87BA3
                                                                                                                                                                                                                                                  • CoCreateInstance.OLE32(00CAFD08,00000000,00000001,00CD6E6C,?), ref: 00C87BEF
                                                                                                                                                                                                                                                  • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00C87C74
                                                                                                                                                                                                                                                  • CoTaskMemFree.OLE32(?,?), ref: 00C87CCC
                                                                                                                                                                                                                                                  • SHBrowseForFolderW.SHELL32(?), ref: 00C87D57
                                                                                                                                                                                                                                                  • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00C87D7A
                                                                                                                                                                                                                                                  • CoTaskMemFree.OLE32(00000000), ref: 00C87D81
                                                                                                                                                                                                                                                  • CoTaskMemFree.OLE32(00000000), ref: 00C87DD6
                                                                                                                                                                                                                                                  • CoUninitialize.OLE32 ref: 00C87DDC
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2762341140-0
                                                                                                                                                                                                                                                  • Opcode ID: ded116ad01b8fbfa14c191d6429f437e67184ec84632fabed18320bea6456f87
                                                                                                                                                                                                                                                  • Instruction ID: 829813c51877d6e04293407057d96a755dfbbd91e56fec1fa819b45cb40fd5b0
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: ded116ad01b8fbfa14c191d6429f437e67184ec84632fabed18320bea6456f87
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: EBC11C75A04109AFCB14DF64C888DAEBBF9FF49308B148599F8199B361D730EE81DB94
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00CA5504
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00CA5515
                                                                                                                                                                                                                                                  • CharNextW.USER32(00000158), ref: 00CA5544
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00CA5585
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00CA559B
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00CA55AC
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: MessageSend$CharNext
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1350042424-0
                                                                                                                                                                                                                                                  • Opcode ID: a350eff7a0b8690eea8a47f783445c3ca02c8bf74f50abff32c2d342338b1e3f
                                                                                                                                                                                                                                                  • Instruction ID: 98758c65d8e06e5ad5483114f2a9b277d7ca06fc5aa90e10e1f631f99587f384
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: a350eff7a0b8690eea8a47f783445c3ca02c8bf74f50abff32c2d342338b1e3f
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A461727190060AEBDF10CFA5CC84AFE7BB9EB0B728F148145F9259B290D7748A81DB60
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00C6FAAF
                                                                                                                                                                                                                                                  • SafeArrayAllocData.OLEAUT32(?), ref: 00C6FB08
                                                                                                                                                                                                                                                  • VariantInit.OLEAUT32(?), ref: 00C6FB1A
                                                                                                                                                                                                                                                  • SafeArrayAccessData.OLEAUT32(?,?), ref: 00C6FB3A
                                                                                                                                                                                                                                                  • VariantCopy.OLEAUT32(?,?), ref: 00C6FB8D
                                                                                                                                                                                                                                                  • SafeArrayUnaccessData.OLEAUT32(?), ref: 00C6FBA1
                                                                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 00C6FBB6
                                                                                                                                                                                                                                                  • SafeArrayDestroyData.OLEAUT32(?), ref: 00C6FBC3
                                                                                                                                                                                                                                                  • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00C6FBCC
                                                                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 00C6FBDE
                                                                                                                                                                                                                                                  • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00C6FBE9
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2706829360-0
                                                                                                                                                                                                                                                  • Opcode ID: 550fc13d046008b807ca374c59f412979889887474f0c90880871fc3192f7d67
                                                                                                                                                                                                                                                  • Instruction ID: 7b0361a5a22df591040135abe1e9eac198323296b03818636a876129ef69d2b5
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 550fc13d046008b807ca374c59f412979889887474f0c90880871fc3192f7d67
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 04414175A002199FCB10DFA8D898AFDBBB9FF49344F008069E955A7261CB30A946DF94
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetKeyboardState.USER32(?), ref: 00C79CA1
                                                                                                                                                                                                                                                  • GetAsyncKeyState.USER32(000000A0), ref: 00C79D22
                                                                                                                                                                                                                                                  • GetKeyState.USER32(000000A0), ref: 00C79D3D
                                                                                                                                                                                                                                                  • GetAsyncKeyState.USER32(000000A1), ref: 00C79D57
                                                                                                                                                                                                                                                  • GetKeyState.USER32(000000A1), ref: 00C79D6C
                                                                                                                                                                                                                                                  • GetAsyncKeyState.USER32(00000011), ref: 00C79D84
                                                                                                                                                                                                                                                  • GetKeyState.USER32(00000011), ref: 00C79D96
                                                                                                                                                                                                                                                  • GetAsyncKeyState.USER32(00000012), ref: 00C79DAE
                                                                                                                                                                                                                                                  • GetKeyState.USER32(00000012), ref: 00C79DC0
                                                                                                                                                                                                                                                  • GetAsyncKeyState.USER32(0000005B), ref: 00C79DD8
                                                                                                                                                                                                                                                  • GetKeyState.USER32(0000005B), ref: 00C79DEA
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: State$Async$Keyboard
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 541375521-0
                                                                                                                                                                                                                                                  • Opcode ID: 6e77883cd58d345d4cc3a348f287678ce68dea2ee526c5ca91f61e308404e63d
                                                                                                                                                                                                                                                  • Instruction ID: 7fa7026c67827200eb6f8cb52d1aac8a917bba2afda696509dd9d41860039d10
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6e77883cd58d345d4cc3a348f287678ce68dea2ee526c5ca91f61e308404e63d
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7641A834504BC96DFF31966488443B5BEA1EF22344F08C05ADADA575C2EBB59BC8C792
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • WSAStartup.WSOCK32(00000101,?), ref: 00C905BC
                                                                                                                                                                                                                                                  • inet_addr.WSOCK32(?), ref: 00C9061C
                                                                                                                                                                                                                                                  • gethostbyname.WSOCK32(?), ref: 00C90628
                                                                                                                                                                                                                                                  • IcmpCreateFile.IPHLPAPI ref: 00C90636
                                                                                                                                                                                                                                                  • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00C906C6
                                                                                                                                                                                                                                                  • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00C906E5
                                                                                                                                                                                                                                                  • IcmpCloseHandle.IPHLPAPI(?), ref: 00C907B9
                                                                                                                                                                                                                                                  • WSACleanup.WSOCK32 ref: 00C907BF
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                                                                                                                                                                                  • String ID: Ping
                                                                                                                                                                                                                                                  • API String ID: 1028309954-2246546115
                                                                                                                                                                                                                                                  • Opcode ID: dd54968f91952350f690c1348937e7e297ca8aa090b7b12375688c035c2fedb6
                                                                                                                                                                                                                                                  • Instruction ID: 659d987caf52861a2c086655fb19326dd19638c6189db6aef74a8f9165639b7e
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: dd54968f91952350f690c1348937e7e297ca8aa090b7b12375688c035c2fedb6
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: D5917C35604201AFDB20DF55D888F1ABBE0AF45328F2585A9F4698B6A2C730ED85CF91
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: _wcslen$BuffCharLower
                                                                                                                                                                                                                                                  • String ID: cdecl$none$stdcall$winapi
                                                                                                                                                                                                                                                  • API String ID: 707087890-567219261
                                                                                                                                                                                                                                                  • Opcode ID: 4c4395deb71ac892af65ef6e9e1f1b88efa659c3e3243d18fd6a1095db3f4d37
                                                                                                                                                                                                                                                  • Instruction ID: fcc99781b443433e0e62888ef2407a8ea24deaaa3865e157a68ed44b4b619980
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4c4395deb71ac892af65ef6e9e1f1b88efa659c3e3243d18fd6a1095db3f4d37
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2751C136A001169BCF14DF68C8549BEB3A5BF66720B204229F526E73C4EB35DE48D790
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • CoInitialize.OLE32 ref: 00C93774
                                                                                                                                                                                                                                                  • CoUninitialize.OLE32 ref: 00C9377F
                                                                                                                                                                                                                                                  • CoCreateInstance.OLE32(?,00000000,00000017,00CAFB78,?), ref: 00C937D9
                                                                                                                                                                                                                                                  • IIDFromString.OLE32(?,?), ref: 00C9384C
                                                                                                                                                                                                                                                  • VariantInit.OLEAUT32(?), ref: 00C938E4
                                                                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 00C93936
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                                                                                                                                                                                                                  • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                                                                                                                                                                                  • API String ID: 636576611-1287834457
                                                                                                                                                                                                                                                  • Opcode ID: b4d4658d739cee0dae0ba35679774e89e1a9c77f2dcf2dd27a8a89a1c0105718
                                                                                                                                                                                                                                                  • Instruction ID: 73cd9988ca55e7a141b21d747548fa6ce3e152b506b77e1cf6f7bb12eae4e49e
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: b4d4658d739cee0dae0ba35679774e89e1a9c77f2dcf2dd27a8a89a1c0105718
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1661CE70208341AFDB10DF54C88CB6ABBE8EF49714F10091AF9959B291D770EE48DB96
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00C833CF
                                                                                                                                                                                                                                                    • Part of subcall function 00C19CB3: _wcslen.LIBCMT ref: 00C19CBD
                                                                                                                                                                                                                                                  • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00C833F0
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: LoadString$_wcslen
                                                                                                                                                                                                                                                  • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                                                                                                                                                                                                  • API String ID: 4099089115-3080491070
                                                                                                                                                                                                                                                  • Opcode ID: a14a339ee8d8720190431e67f15065f0b2abe6042744e2e14a0a955dbc6dba7d
                                                                                                                                                                                                                                                  • Instruction ID: 59c7ac9a7e28bf1e840823d4acd5e7437b9d81d964af3d4be3486d3fb9bf636f
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: a14a339ee8d8720190431e67f15065f0b2abe6042744e2e14a0a955dbc6dba7d
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8351AC71900249AADF14EBA0CD92EEEB778EF05744F144066F509721A2EB312F98FB60
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                                                                  • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                                                                                                                                                                                                  • API String ID: 1256254125-769500911
                                                                                                                                                                                                                                                  • Opcode ID: 64b1185641e179dfbdf143d03354c5dac93fa7ff5e90d2e9875b2b35278b73aa
                                                                                                                                                                                                                                                  • Instruction ID: a95f5fa7ef181c713d1075588e4d0887c0d2fa84e0e593dfe9a41148ee55a2d4
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 64b1185641e179dfbdf143d03354c5dac93fa7ff5e90d2e9875b2b35278b73aa
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9841D832A001269ACB146F7D88907BE77B5AF61764B258129F639D7284E735CE81C790
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 00C853A0
                                                                                                                                                                                                                                                  • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00C85416
                                                                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00C85420
                                                                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000000,READY), ref: 00C854A7
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Error$Mode$DiskFreeLastSpace
                                                                                                                                                                                                                                                  • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                                                                                                                                                                                                  • API String ID: 4194297153-14809454
                                                                                                                                                                                                                                                  • Opcode ID: 1c26a69b5c6433bfa66afe46abbbb63e362678460a011b17f42220aa5dbd954f
                                                                                                                                                                                                                                                  • Instruction ID: 687e9efe11da535c230dd8b0acb7b2b9b87bbe2cf5d763936f6473c05653c412
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1c26a69b5c6433bfa66afe46abbbb63e362678460a011b17f42220aa5dbd954f
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: D231A375A006049FDB10EF68C484BAE7BF4EF85309F14806AE515CB392DBB1DE86DB90
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • CreateMenu.USER32 ref: 00CA3C79
                                                                                                                                                                                                                                                  • SetMenu.USER32(?,00000000), ref: 00CA3C88
                                                                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00CA3D10
                                                                                                                                                                                                                                                  • IsMenu.USER32(?), ref: 00CA3D24
                                                                                                                                                                                                                                                  • CreatePopupMenu.USER32 ref: 00CA3D2E
                                                                                                                                                                                                                                                  • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00CA3D5B
                                                                                                                                                                                                                                                  • DrawMenuBar.USER32 ref: 00CA3D63
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                                                                                                                                                                                                  • String ID: 0$F
                                                                                                                                                                                                                                                  • API String ID: 161812096-3044882817
                                                                                                                                                                                                                                                  • Opcode ID: c89dec56ebc5cbd39ee45d1a5747405ddb136479c3b0d52b754f7a5482ed0a31
                                                                                                                                                                                                                                                  • Instruction ID: d754f2b1a928512efc728393e9351a7100c0340ce9e21bd9e756bdc07ba05c66
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c89dec56ebc5cbd39ee45d1a5747405ddb136479c3b0d52b754f7a5482ed0a31
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: FE418A75A0120AEFDB14CF64D898BEE7BB5FF4A358F140029F916A7360D730AA10DB90
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C19CB3: _wcslen.LIBCMT ref: 00C19CBD
                                                                                                                                                                                                                                                    • Part of subcall function 00C73CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00C73CCA
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00C71F64
                                                                                                                                                                                                                                                  • GetDlgCtrlID.USER32 ref: 00C71F6F
                                                                                                                                                                                                                                                  • GetParent.USER32 ref: 00C71F8B
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,?,00000111,?), ref: 00C71F8E
                                                                                                                                                                                                                                                  • GetDlgCtrlID.USER32(?), ref: 00C71F97
                                                                                                                                                                                                                                                  • GetParent.USER32(?), ref: 00C71FAB
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,?,00000111,?), ref: 00C71FAE
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                                                                                                                                                                                  • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                  • API String ID: 711023334-1403004172
                                                                                                                                                                                                                                                  • Opcode ID: e17627c4d07e3cbc4800709bc3b36fc45c680ee99580562bbfb16d874a974485
                                                                                                                                                                                                                                                  • Instruction ID: d4e6b5a8851bbfe87fa5578aef910230097738082b8a104e9c2a6539c484dbb7
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e17627c4d07e3cbc4800709bc3b36fc45c680ee99580562bbfb16d874a974485
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2221B070A00214BBCF05EFE4CC95AEEBBB8EF06350F104116F965672D1CB345914AB60
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C19CB3: _wcslen.LIBCMT ref: 00C19CBD
                                                                                                                                                                                                                                                    • Part of subcall function 00C73CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00C73CCA
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 00C72043
                                                                                                                                                                                                                                                  • GetDlgCtrlID.USER32 ref: 00C7204E
                                                                                                                                                                                                                                                  • GetParent.USER32 ref: 00C7206A
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,?,00000111,?), ref: 00C7206D
                                                                                                                                                                                                                                                  • GetDlgCtrlID.USER32(?), ref: 00C72076
                                                                                                                                                                                                                                                  • GetParent.USER32(?), ref: 00C7208A
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,?,00000111,?), ref: 00C7208D
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                                                                                                                                                                                  • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                  • API String ID: 711023334-1403004172
                                                                                                                                                                                                                                                  • Opcode ID: 30d8d16add0d496867e0f4a251d119c4e62e7cb0be692f289cf4099778b8dc9a
                                                                                                                                                                                                                                                  • Instruction ID: ea914798cfbe84e64639c3e9c6e57b5cd894a6339cc525c7333bacc5a095d862
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 30d8d16add0d496867e0f4a251d119c4e62e7cb0be692f289cf4099778b8dc9a
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: C5219F75A00214BBDF11EFA0CC95FEEBFB8EF06344F004016B995A72A1DA754954EB60
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00CA3A9D
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00CA3AA0
                                                                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00CA3AC7
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00CA3AEA
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00CA3B62
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00CA3BAC
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00CA3BC7
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00CA3BE2
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00CA3BF6
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00CA3C13
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: MessageSend$LongWindow
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 312131281-0
                                                                                                                                                                                                                                                  • Opcode ID: bb75d45a8a6bdf956c3db4fc7d36b1b578d5cd740d30422ce77cf7a7d2afb65c
                                                                                                                                                                                                                                                  • Instruction ID: b24e242a5af7e021f4ed7bd53f76d647d5fc8e63795c0a2f53e22243eb3e5ed9
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: bb75d45a8a6bdf956c3db4fc7d36b1b578d5cd740d30422ce77cf7a7d2afb65c
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1E617D75900249AFDB10DFA4CC91FEE77B8EB0A718F140199FA15A7291C770AE41DB60
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00C7B151
                                                                                                                                                                                                                                                  • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00C7A1E1,?,00000001), ref: 00C7B165
                                                                                                                                                                                                                                                  • GetWindowThreadProcessId.USER32(00000000), ref: 00C7B16C
                                                                                                                                                                                                                                                  • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00C7A1E1,?,00000001), ref: 00C7B17B
                                                                                                                                                                                                                                                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 00C7B18D
                                                                                                                                                                                                                                                  • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00C7A1E1,?,00000001), ref: 00C7B1A6
                                                                                                                                                                                                                                                  • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00C7A1E1,?,00000001), ref: 00C7B1B8
                                                                                                                                                                                                                                                  • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00C7A1E1,?,00000001), ref: 00C7B1FD
                                                                                                                                                                                                                                                  • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00C7A1E1,?,00000001), ref: 00C7B212
                                                                                                                                                                                                                                                  • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00C7A1E1,?,00000001), ref: 00C7B21D
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2156557900-0
                                                                                                                                                                                                                                                  • Opcode ID: a18eff551d593416754ad63eec5ab872c8bd661b45735e5905f3b072bafe3d73
                                                                                                                                                                                                                                                  • Instruction ID: 00ed2143544123f13f93befdc49ca51ffb7a425a282f27cdf7b671a591a92c96
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: a18eff551d593416754ad63eec5ab872c8bd661b45735e5905f3b072bafe3d73
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4F318D75500248BFDB10DF64DCC8BAE7BAABB52365F108415FA29DB191D7B8AF408F60
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C42C94
                                                                                                                                                                                                                                                    • Part of subcall function 00C429C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00C4D7D1,00000000,00000000,00000000,00000000,?,00C4D7F8,00000000,00000007,00000000,?,00C4DBF5,00000000), ref: 00C429DE
                                                                                                                                                                                                                                                    • Part of subcall function 00C429C8: GetLastError.KERNEL32(00000000,?,00C4D7D1,00000000,00000000,00000000,00000000,?,00C4D7F8,00000000,00000007,00000000,?,00C4DBF5,00000000,00000000), ref: 00C429F0
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C42CA0
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C42CAB
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C42CB6
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C42CC1
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C42CCC
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C42CD7
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C42CE2
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C42CED
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C42CFB
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 776569668-0
                                                                                                                                                                                                                                                  • Opcode ID: 207fdcf16463c1253bbb35480facc6dd79e20e2929c5767799fc778d761c133a
                                                                                                                                                                                                                                                  • Instruction ID: 087b1d99bcd284e0be25c70e43f2be8ebe240f51b084850040c20506c9e4ff83
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 207fdcf16463c1253bbb35480facc6dd79e20e2929c5767799fc778d761c133a
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A511B376100108BFDB02EF95D883CDD3BA9FF15350F9144A5FA489F222DA31EE50AB90
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00C87FAD
                                                                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00C87FC1
                                                                                                                                                                                                                                                  • GetFileAttributesW.KERNEL32(?), ref: 00C87FEB
                                                                                                                                                                                                                                                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 00C88005
                                                                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00C88017
                                                                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00C88060
                                                                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00C880B0
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CurrentDirectory$AttributesFile
                                                                                                                                                                                                                                                  • String ID: *.*
                                                                                                                                                                                                                                                  • API String ID: 769691225-438819550
                                                                                                                                                                                                                                                  • Opcode ID: d6126d18e878b4100141a2a6641c76747b33092d856233d6eaf98d5eab8c8191
                                                                                                                                                                                                                                                  • Instruction ID: 1ce880cb4faaf175f275de64010b958c5d46e5e41388156aca32179d5942dcd1
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: d6126d18e878b4100141a2a6641c76747b33092d856233d6eaf98d5eab8c8191
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1C81C1725082019FCB20FF55C484AAEB3E8BF89318F64495EF899C7250EB34DE49DB56
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SetWindowLongW.USER32(?,000000EB), ref: 00C15C7A
                                                                                                                                                                                                                                                    • Part of subcall function 00C15D0A: GetClientRect.USER32(?,?), ref: 00C15D30
                                                                                                                                                                                                                                                    • Part of subcall function 00C15D0A: GetWindowRect.USER32(?,?), ref: 00C15D71
                                                                                                                                                                                                                                                    • Part of subcall function 00C15D0A: ScreenToClient.USER32(?,?), ref: 00C15D99
                                                                                                                                                                                                                                                  • GetDC.USER32 ref: 00C546F5
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00C54708
                                                                                                                                                                                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00C54716
                                                                                                                                                                                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00C5472B
                                                                                                                                                                                                                                                  • ReleaseDC.USER32(?,00000000), ref: 00C54733
                                                                                                                                                                                                                                                  • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00C547C4
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                                                                                                                                                                                                  • String ID: U
                                                                                                                                                                                                                                                  • API String ID: 4009187628-3372436214
                                                                                                                                                                                                                                                  • Opcode ID: 8fdf0554f8a12b4da143b9e2180e1fda7e98058257ce33448ecc21c74935aaec
                                                                                                                                                                                                                                                  • Instruction ID: 4278cf76160064294e5b95779ddeda37ba2f25251e521c6cd511628ad9d2a0cf
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8fdf0554f8a12b4da143b9e2180e1fda7e98058257ce33448ecc21c74935aaec
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9A71D239400205DFCF298F64C984BEA3BB1FF4A35AF144265FD655A1A6C73089D5EF50
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00C835E4
                                                                                                                                                                                                                                                    • Part of subcall function 00C19CB3: _wcslen.LIBCMT ref: 00C19CBD
                                                                                                                                                                                                                                                  • LoadStringW.USER32(00CE2390,?,00000FFF,?), ref: 00C8360A
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: LoadString$_wcslen
                                                                                                                                                                                                                                                  • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                                                                                                                                                                                                  • API String ID: 4099089115-2391861430
                                                                                                                                                                                                                                                  • Opcode ID: 94d1e2e060d51aed39a2478a6b06352bbaaf421d8142c80f00dcb878d13e6cdd
                                                                                                                                                                                                                                                  • Instruction ID: 3d56f9a7c357d13eed1afdb36196e3a84f283064c5912e081cfbc445921151d9
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 94d1e2e060d51aed39a2478a6b06352bbaaf421d8142c80f00dcb878d13e6cdd
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2F517C71900249AADF14EBA0CD92EEEBB38EF05714F444125F615721A1EB306BD9FBA4
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00C8C272
                                                                                                                                                                                                                                                  • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00C8C29A
                                                                                                                                                                                                                                                  • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00C8C2CA
                                                                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00C8C322
                                                                                                                                                                                                                                                  • SetEvent.KERNEL32(?), ref: 00C8C336
                                                                                                                                                                                                                                                  • InternetCloseHandle.WININET(00000000), ref: 00C8C341
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3113390036-3916222277
                                                                                                                                                                                                                                                  • Opcode ID: ed741bc27f4c6564e2f885e80937a9beba1589095ce8c7123f0a41f1e70876a9
                                                                                                                                                                                                                                                  • Instruction ID: acd80eeffbfb9ef2759b601fa84571b321e498aad94bbb7fe3f998e9e4e2d19e
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: ed741bc27f4c6564e2f885e80937a9beba1589095ce8c7123f0a41f1e70876a9
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: B1316BB1600608AFD721AFA598C8BAB7BFCEB4A748B10851EF456D3250DB34DE059B74
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00C53AAF,?,?,Bad directive syntax error,00CACC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 00C798BC
                                                                                                                                                                                                                                                  • LoadStringW.USER32(00000000,?,00C53AAF,?), ref: 00C798C3
                                                                                                                                                                                                                                                    • Part of subcall function 00C19CB3: _wcslen.LIBCMT ref: 00C19CBD
                                                                                                                                                                                                                                                  • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00C79987
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: HandleLoadMessageModuleString_wcslen
                                                                                                                                                                                                                                                  • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                                                                                                                                                                                  • API String ID: 858772685-4153970271
                                                                                                                                                                                                                                                  • Opcode ID: c47b05dae26b2c9af6842d4e9ab23098c721bb1bfbccb2b747df1e59e9c14d69
                                                                                                                                                                                                                                                  • Instruction ID: 38c1c07f5a12a2dd4208094548cd5fcc4386e03a94e9abae452c7ffe74779806
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c47b05dae26b2c9af6842d4e9ab23098c721bb1bfbccb2b747df1e59e9c14d69
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1B219F3194021EABDF11EF90CC56EEE7775FF19304F04446AF619620A2EB71A658FB50
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetParent.USER32 ref: 00C720AB
                                                                                                                                                                                                                                                  • GetClassNameW.USER32(00000000,?,00000100), ref: 00C720C0
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00C7214D
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ClassMessageNameParentSend
                                                                                                                                                                                                                                                  • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                                                                                                                                                                                  • API String ID: 1290815626-3381328864
                                                                                                                                                                                                                                                  • Opcode ID: 5b6da6b951882f54b0f608cac06db99b046900c0e33308f9923cf85252afffc3
                                                                                                                                                                                                                                                  • Instruction ID: f70d2c4c38da9a05c22cb591a716ef7f677d4ab40e34257519503ab6d94eb39a
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5b6da6b951882f54b0f608cac06db99b046900c0e33308f9923cf85252afffc3
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: E8112976688706BBF6056621DC0BEAE379CEB05324F608027FB09A51D1FE616D016614
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                                  • Opcode ID: bd5e4556ebef24e971687e57ba6ca0e9ef2e18baf40945c86cee1270c33ca44c
                                                                                                                                                                                                                                                  • Instruction ID: a2585ef04eb951dbbb6d72982fd4570435d36f54d3ab1c7e3340591c5d9ff7fc
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: bd5e4556ebef24e971687e57ba6ca0e9ef2e18baf40945c86cee1270c33ca44c
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4AC1E074D04259AFDB11DFA9D881BAEBBB0BF0D310F144099F824AB392C7758A46CB61
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1282221369-0
                                                                                                                                                                                                                                                  • Opcode ID: 9df3e06131223831e2837b77ec67e26b05d49207c6f1315b61f0b39406d63356
                                                                                                                                                                                                                                                  • Instruction ID: 6a6df60b8a69b5f323c692be2769586903405e2a0275a056f6ee6eb79ff79ddf
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9df3e06131223831e2837b77ec67e26b05d49207c6f1315b61f0b39406d63356
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 33616A71905300AFEB21AFF49CC1B6E7BA5FF01310F14416DF9519B292DB3A9E4597A0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00CA5186
                                                                                                                                                                                                                                                  • ShowWindow.USER32(?,00000000), ref: 00CA51C7
                                                                                                                                                                                                                                                  • ShowWindow.USER32(?,00000005,?,00000000), ref: 00CA51CD
                                                                                                                                                                                                                                                  • SetFocus.USER32(?,?,00000005,?,00000000), ref: 00CA51D1
                                                                                                                                                                                                                                                    • Part of subcall function 00CA6FBA: DeleteObject.GDI32(00000000), ref: 00CA6FE6
                                                                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00CA520D
                                                                                                                                                                                                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00CA521A
                                                                                                                                                                                                                                                  • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00CA524D
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00CA5287
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00CA5296
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3210457359-0
                                                                                                                                                                                                                                                  • Opcode ID: ea77a5dadc6bd99591664282d6cbbfae2666edd0fefcfe043c58b792d637fdb7
                                                                                                                                                                                                                                                  • Instruction ID: 257022bb51d67e7ad6a7fda3bfc195c9f1d1f9beaf852bbcb3ac91ae1dbcf73e
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: ea77a5dadc6bd99591664282d6cbbfae2666edd0fefcfe043c58b792d637fdb7
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0D519030A40A0ABEEF309F65DC49BEC3B65EB07329F14C111F625962E1C775AA90EB40
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00C66890
                                                                                                                                                                                                                                                  • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00C668A9
                                                                                                                                                                                                                                                  • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00C668B9
                                                                                                                                                                                                                                                  • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00C668D1
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00C668F2
                                                                                                                                                                                                                                                  • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00C28874,00000000,00000000,00000000,000000FF,00000000), ref: 00C66901
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00C6691E
                                                                                                                                                                                                                                                  • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00C28874,00000000,00000000,00000000,000000FF,00000000), ref: 00C6692D
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1268354404-0
                                                                                                                                                                                                                                                  • Opcode ID: 645bf1a16091b128eb09ca0c0372c82b8946d83a9a5d1c6d9b72e49f9e244cef
                                                                                                                                                                                                                                                  • Instruction ID: ab0e2f196258d975cdfcf8ac231eca985152ae88c91506de8539ec2a5750b0b0
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 645bf1a16091b128eb09ca0c0372c82b8946d83a9a5d1c6d9b72e49f9e244cef
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6E519770A00209EFDB20CF25DC95FAE7BB5EB48764F10451CF922976A0DB70EA90DB50
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00C8C182
                                                                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00C8C195
                                                                                                                                                                                                                                                  • SetEvent.KERNEL32(?), ref: 00C8C1A9
                                                                                                                                                                                                                                                    • Part of subcall function 00C8C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00C8C272
                                                                                                                                                                                                                                                    • Part of subcall function 00C8C253: GetLastError.KERNEL32 ref: 00C8C322
                                                                                                                                                                                                                                                    • Part of subcall function 00C8C253: SetEvent.KERNEL32(?), ref: 00C8C336
                                                                                                                                                                                                                                                    • Part of subcall function 00C8C253: InternetCloseHandle.WININET(00000000), ref: 00C8C341
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 337547030-0
                                                                                                                                                                                                                                                  • Opcode ID: 3075cc331fd717c5f73d0793418f82b0ab5674fd047f3fa50a958fb1f24ede9a
                                                                                                                                                                                                                                                  • Instruction ID: d2c51bd56db1d81dc038c0dcc04fb8dfbadb800f5c09b8ba247af8cbb985e374
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3075cc331fd717c5f73d0793418f82b0ab5674fd047f3fa50a958fb1f24ede9a
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7E317E71100605AFDB21AFA5DC84B6BBBE8FF19308B00451DF96683660DB35E9149B74
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C73A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00C73A57
                                                                                                                                                                                                                                                    • Part of subcall function 00C73A3D: GetCurrentThreadId.KERNEL32 ref: 00C73A5E
                                                                                                                                                                                                                                                    • Part of subcall function 00C73A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00C725B3), ref: 00C73A65
                                                                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 00C725BD
                                                                                                                                                                                                                                                  • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00C725DB
                                                                                                                                                                                                                                                  • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00C725DF
                                                                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 00C725E9
                                                                                                                                                                                                                                                  • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00C72601
                                                                                                                                                                                                                                                  • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00C72605
                                                                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 00C7260F
                                                                                                                                                                                                                                                  • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00C72623
                                                                                                                                                                                                                                                  • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00C72627
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2014098862-0
                                                                                                                                                                                                                                                  • Opcode ID: d9f5be0954dad50d09e4815232f2ce8dc6ddc934d306b0f6d93290f8082dcd72
                                                                                                                                                                                                                                                  • Instruction ID: 9139499922229377cd2ceaaa17a91a7d8182d9235869dd06d5015e47a0b4f733
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: d9f5be0954dad50d09e4815232f2ce8dc6ddc934d306b0f6d93290f8082dcd72
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5F01D431390610BBFB2067A99CCAF5D3F59DB4EB56F104001F318AF0D1C9E22445AA69
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00C71449,?,?,00000000), ref: 00C7180C
                                                                                                                                                                                                                                                  • HeapAlloc.KERNEL32(00000000,?,00C71449,?,?,00000000), ref: 00C71813
                                                                                                                                                                                                                                                  • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00C71449,?,?,00000000), ref: 00C71828
                                                                                                                                                                                                                                                  • GetCurrentProcess.KERNEL32(?,00000000,?,00C71449,?,?,00000000), ref: 00C71830
                                                                                                                                                                                                                                                  • DuplicateHandle.KERNEL32(00000000,?,00C71449,?,?,00000000), ref: 00C71833
                                                                                                                                                                                                                                                  • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00C71449,?,?,00000000), ref: 00C71843
                                                                                                                                                                                                                                                  • GetCurrentProcess.KERNEL32(00C71449,00000000,?,00C71449,?,?,00000000), ref: 00C7184B
                                                                                                                                                                                                                                                  • DuplicateHandle.KERNEL32(00000000,?,00C71449,?,?,00000000), ref: 00C7184E
                                                                                                                                                                                                                                                  • CreateThread.KERNEL32(00000000,00000000,00C71874,00000000,00000000,00000000), ref: 00C71868
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1957940570-0
                                                                                                                                                                                                                                                  • Opcode ID: d9616213427ba3d3f3e94f1926e167d2d22922ead79c6cf9bd4540af8905f7d0
                                                                                                                                                                                                                                                  • Instruction ID: 9c52a490a50581d6f7a7321474b1ce357163cd5ed9608ceb0a3eeba52a503d36
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: d9616213427ba3d3f3e94f1926e167d2d22922ead79c6cf9bd4540af8905f7d0
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3401AC75340304BFE610ABA5DC89F9F3BACEB8AB15F014411FA05DB1A1DA7098108B20
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C7D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 00C7D501
                                                                                                                                                                                                                                                    • Part of subcall function 00C7D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 00C7D50F
                                                                                                                                                                                                                                                    • Part of subcall function 00C7D4DC: CloseHandle.KERNELBASE(00000000), ref: 00C7D5DC
                                                                                                                                                                                                                                                  • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00C9A16D
                                                                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00C9A180
                                                                                                                                                                                                                                                  • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00C9A1B3
                                                                                                                                                                                                                                                  • TerminateProcess.KERNEL32(00000000,00000000), ref: 00C9A268
                                                                                                                                                                                                                                                  • GetLastError.KERNEL32(00000000), ref: 00C9A273
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00C9A2C4
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                                                                                                                                                                                                  • String ID: SeDebugPrivilege
                                                                                                                                                                                                                                                  • API String ID: 2533919879-2896544425
                                                                                                                                                                                                                                                  • Opcode ID: 262446d0f10c6b01932959a860b97cf5b68a57130c7b3b573668d63d503633fb
                                                                                                                                                                                                                                                  • Instruction ID: 7ba9ae32f35acd34ba64c67d0cef97c7864c86ce52419e57f839fcadf9f35ac0
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 262446d0f10c6b01932959a860b97cf5b68a57130c7b3b573668d63d503633fb
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: CB618F30208641AFDB10DF19C498F59BBE1AF45318F14849CE46A8B7A3C772ED85DBD2
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00CA3925
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00CA393A
                                                                                                                                                                                                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00CA3954
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00CA3999
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001057,00000000,?), ref: 00CA39C6
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00CA39F4
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: MessageSend$Window_wcslen
                                                                                                                                                                                                                                                  • String ID: SysListView32
                                                                                                                                                                                                                                                  • API String ID: 2147712094-78025650
                                                                                                                                                                                                                                                  • Opcode ID: e57a9233ab9ec466a4d47bf5eff094f7c74b375b426052c03bca376b1f26a274
                                                                                                                                                                                                                                                  • Instruction ID: e2a71e6da2c224cc6d508aff93024528f8a43ac479ea660e99032ff33db5bc8a
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e57a9233ab9ec466a4d47bf5eff094f7c74b375b426052c03bca376b1f26a274
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: F241C571A00259ABDF21DFA4CC45BEE77A9EF09358F100126F954E7281D7759E80CB90
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C7BCFD
                                                                                                                                                                                                                                                  • IsMenu.USER32(00000000), ref: 00C7BD1D
                                                                                                                                                                                                                                                  • CreatePopupMenu.USER32 ref: 00C7BD53
                                                                                                                                                                                                                                                  • GetMenuItemCount.USER32(01466710), ref: 00C7BDA4
                                                                                                                                                                                                                                                  • InsertMenuItemW.USER32(01466710,?,00000001,00000030), ref: 00C7BDCC
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                                                                                                                                                                                                  • String ID: 0$2
                                                                                                                                                                                                                                                  • API String ID: 93392585-3793063076
                                                                                                                                                                                                                                                  • Opcode ID: c6026f92ba96bde6e91278721007c04eec4d1a5ed3951e037e1bbd04fea28e60
                                                                                                                                                                                                                                                  • Instruction ID: 2c7828588ef46e1aefbac78fb2c6b9850165b144f641617b221f6cb88bf0886f
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c6026f92ba96bde6e91278721007c04eec4d1a5ed3951e037e1bbd04fea28e60
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8C519E70A002059FDB21CFA9D8C4BAEBBF8AF65314F14C119F429D7299E770AE40CB51
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • LoadIconW.USER32(00000000,00007F03), ref: 00C7C913
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: IconLoad
                                                                                                                                                                                                                                                  • String ID: blank$info$question$stop$warning
                                                                                                                                                                                                                                                  • API String ID: 2457776203-404129466
                                                                                                                                                                                                                                                  • Opcode ID: 766abd51e050cbefa7670ee58b310f6e92352d146631cb2f736e7bfdc54cfe0a
                                                                                                                                                                                                                                                  • Instruction ID: ba686512ad9d0f5baab782692d26b31cdc72da8b929b5da70947680a4188122f
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 766abd51e050cbefa7670ee58b310f6e92352d146631cb2f736e7bfdc54cfe0a
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: C7110D3268930BBAE7055B559CC3DEE679CDF15354F11403FF618A62C2D7706E006365
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                                                                                                                                                                                                                  • String ID: 0.0.0.0
                                                                                                                                                                                                                                                  • API String ID: 642191829-3771769585
                                                                                                                                                                                                                                                  • Opcode ID: dc695becc45a8eef145e1919de0a907009fb8f24d87bbb09551bf465cfa1ada7
                                                                                                                                                                                                                                                  • Instruction ID: 17ff50be22e53acb412e450f8e5078e3d44bb9861b6b86df17aabd32a2beb925
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: dc695becc45a8eef145e1919de0a907009fb8f24d87bbb09551bf465cfa1ada7
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4D113632900215ABCB25AB309C4AFEE77BCDF15314F0041A9F01ADB091EF709A81DA50
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00C6D3AD
                                                                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00C6D3BF
                                                                                                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 00C6D3E5
                                                                                                                                                                                                                                                  • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00C6D3FC
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                                                                                                                                                                                                                                  • String ID: GetSystemWow64DirectoryW$X64$kernel32.dll
                                                                                                                                                                                                                                                  • API String ID: 582185067-2904798639
                                                                                                                                                                                                                                                  • Opcode ID: dc5ff6cdd5c5ba8af3b7d2d841240a46ea8a6369c5a23025057ffce6a6c4cdd2
                                                                                                                                                                                                                                                  • Instruction ID: 8cc0e7e36621f18d04acdcbcdf50ee928a6c84f846017b24fa1d8b8fb625bc55
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: dc5ff6cdd5c5ba8af3b7d2d841240a46ea8a6369c5a23025057ffce6a6c4cdd2
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 58F02770F462359BC77157519CE8B6D7334AF01B05F448065F603F7260DB30CE048AA1
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C29BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00C29BB2
                                                                                                                                                                                                                                                  • GetSystemMetrics.USER32(0000000F), ref: 00CA9FC7
                                                                                                                                                                                                                                                  • GetSystemMetrics.USER32(0000000F), ref: 00CA9FE7
                                                                                                                                                                                                                                                  • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00CAA224
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00CAA242
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00CAA263
                                                                                                                                                                                                                                                  • ShowWindow.USER32(00000003,00000000), ref: 00CAA282
                                                                                                                                                                                                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00CAA2A7
                                                                                                                                                                                                                                                  • DefDlgProcW.USER32(?,00000005,?,?), ref: 00CAA2CA
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1211466189-0
                                                                                                                                                                                                                                                  • Opcode ID: 5eb862d968151517cd1ff7b9972da19bb4bc2b88a35bb4a7e7714f333feb916a
                                                                                                                                                                                                                                                  • Instruction ID: f732d68d7256c9d579af4b35c9e05f5d3ab1ebaf85dc5e6c1325c1708ba3bb95
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5eb862d968151517cd1ff7b9972da19bb4bc2b88a35bb4a7e7714f333feb916a
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A1B1EA30600216EFDF14CF68C9C97AE7BB2FF4A308F088169ED599B295D731AA50CB51
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: _wcslen$LocalTime
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 952045576-0
                                                                                                                                                                                                                                                  • Opcode ID: 5decba3f534bc3102807fb4e01f40023d6f4c014888e9e653b73b314904bbc46
                                                                                                                                                                                                                                                  • Instruction ID: cd9475c3a134fbe95ea042d1655e2d1492bdcebd75af878cfd68192b1d222e48
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5decba3f534bc3102807fb4e01f40023d6f4c014888e9e653b73b314904bbc46
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4A419366C2021875CB11EBF4C88AACFB7ACAF49710F508962F518E3121FB35E655C3A6
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00C6682C,00000004,00000000,00000000), ref: 00C2F953
                                                                                                                                                                                                                                                  • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,00C6682C,00000004,00000000,00000000), ref: 00C6F3D1
                                                                                                                                                                                                                                                  • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00C6682C,00000004,00000000,00000000), ref: 00C6F454
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ShowWindow
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1268545403-0
                                                                                                                                                                                                                                                  • Opcode ID: f513e7348c62dc5316ceba69ebbb2a19c1301ce6e6046ef91f3830d152474229
                                                                                                                                                                                                                                                  • Instruction ID: c837cfa8e49f02a3792685daf80fa939e39b40f2da5ab7f1859378aeb65d8905
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: f513e7348c62dc5316ceba69ebbb2a19c1301ce6e6046ef91f3830d152474229
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: C6412C31608698BAC738AB2EB8C873E7BB1AB56314F14443CE09757D61CA719AC3D710
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • DeleteObject.GDI32(00000000), ref: 00CA2D1B
                                                                                                                                                                                                                                                  • GetDC.USER32(00000000), ref: 00CA2D23
                                                                                                                                                                                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00CA2D2E
                                                                                                                                                                                                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 00CA2D3A
                                                                                                                                                                                                                                                  • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00CA2D76
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00CA2D87
                                                                                                                                                                                                                                                  • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00CA5A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00CA2DC2
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00CA2DE1
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3864802216-0
                                                                                                                                                                                                                                                  • Opcode ID: a4a6a0c544bd4e8334224b536dac4192eed612231f7b1eb83db6214986056e62
                                                                                                                                                                                                                                                  • Instruction ID: 0fb0b192d7fdc5515736e2de706bde06d2892b36f6b7261c6b4282221677862d
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: a4a6a0c544bd4e8334224b536dac4192eed612231f7b1eb83db6214986056e62
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6B314C72201224BFEB118F54CC8AFEB3BA9EF0A759F044055FE089B291D6759D51CBA4
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: _memcmp
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2931989736-0
                                                                                                                                                                                                                                                  • Opcode ID: 7eee89c95325a95b595f949d64401df41a4bf99667ea7631d80a5f0de7e0e15f
                                                                                                                                                                                                                                                  • Instruction ID: 90a9bfa523fe7cb66ba7d0a37d232a69eef724b474a6ad45410f0a9cacac4feb
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7eee89c95325a95b595f949d64401df41a4bf99667ea7631d80a5f0de7e0e15f
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8F210BA1750A0A7BD21855228D82FFB335CAF21398F488034FD1C9A781FBB1EF1195E5
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                                  • String ID: NULL Pointer assignment$Not an Object type
                                                                                                                                                                                                                                                  • API String ID: 0-572801152
                                                                                                                                                                                                                                                  • Opcode ID: 0be26bb94c1261c86396ba2695ab20f01abee0da2dc53160ad4cd965e21a32c4
                                                                                                                                                                                                                                                  • Instruction ID: a381865ba70646c0a07ffb658e34be84c216466532cf3f7af73067c68a104e51
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0be26bb94c1261c86396ba2695ab20f01abee0da2dc53160ad4cd965e21a32c4
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 05D1D471A0060A9FDF11CFA8C889FAEB7B5FF48344F148169E925AB291E770DE45CB50
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetCPInfo.KERNEL32(?,?), ref: 00C515CE
                                                                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00C51651
                                                                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00C516E4
                                                                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00C516FB
                                                                                                                                                                                                                                                    • Part of subcall function 00C43820: RtlAllocateHeap.NTDLL(00000000,?,00CE1444,?,00C2FDF5,?,?,00C1A976,00000010,00CE1440,00C113FC,?,00C113C6,?,00C11129), ref: 00C43852
                                                                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00C51777
                                                                                                                                                                                                                                                  • __freea.LIBCMT ref: 00C517A2
                                                                                                                                                                                                                                                  • __freea.LIBCMT ref: 00C517AE
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2829977744-0
                                                                                                                                                                                                                                                  • Opcode ID: dcf1bf6a3eb61a1a99653380de49a234ade551a56d5b55b11ae339aaf4b017d3
                                                                                                                                                                                                                                                  • Instruction ID: 1e9a8bf1f542ec26c4663785e48b04e8f2e52d87f997a7382f88a717da6ef88d
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: dcf1bf6a3eb61a1a99653380de49a234ade551a56d5b55b11ae339aaf4b017d3
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5191B379E002069ADB208E64C889BEE7BA5EB49351F5C0659EC11E7141EB35DE88C768
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Variant$ClearInit
                                                                                                                                                                                                                                                  • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                                                                                                                                                                                  • API String ID: 2610073882-625585964
                                                                                                                                                                                                                                                  • Opcode ID: e7a86f055891c3c7f6138ccc8c1b77857726800aae45b895c557488cc01c0de8
                                                                                                                                                                                                                                                  • Instruction ID: ae68826186965a194104b15d499114c54d13d503ffbf55311975ad511aaee550
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e7a86f055891c3c7f6138ccc8c1b77857726800aae45b895c557488cc01c0de8
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7C919471A00219ABDF28CFA5D888FAE7BB8EF46715F108559F515AB280D7709942CFA0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 00C8125C
                                                                                                                                                                                                                                                  • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00C81284
                                                                                                                                                                                                                                                  • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 00C812A8
                                                                                                                                                                                                                                                  • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00C812D8
                                                                                                                                                                                                                                                  • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00C8135F
                                                                                                                                                                                                                                                  • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00C813C4
                                                                                                                                                                                                                                                  • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00C81430
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2550207440-0
                                                                                                                                                                                                                                                  • Opcode ID: 38a7d0d01428617da6e15b681c985fa430bad06b4bdde1e1227b358fd0c18246
                                                                                                                                                                                                                                                  • Instruction ID: af883c478f994ef19ecd04ddc84113973f39256346aaa48cb53b8ec51c9b5325
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 38a7d0d01428617da6e15b681c985fa430bad06b4bdde1e1227b358fd0c18246
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6C910271A00218AFDB00EF94C884BBEB7F9FF45319F194029E910EB291D774E942DB98
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ObjectSelect$BeginCreatePath
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3225163088-0
                                                                                                                                                                                                                                                  • Opcode ID: 3722211da4197d8335889d59bead01fbb2abe060499f1455d66e32890fbe8c0a
                                                                                                                                                                                                                                                  • Instruction ID: daa4a189429b1f118013b290f58e9ad8faf771d79cde92db8ba1cd58097f4ce8
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3722211da4197d8335889d59bead01fbb2abe060499f1455d66e32890fbe8c0a
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 15916871E00219EFCB10CFA9DC84AEEBBB8FF49320F148559E915B7251D378AA41DB60
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • VariantInit.OLEAUT32(?), ref: 00C9396B
                                                                                                                                                                                                                                                  • CharUpperBuffW.USER32(?,?), ref: 00C93A7A
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C93A8A
                                                                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 00C93C1F
                                                                                                                                                                                                                                                    • Part of subcall function 00C80CDF: VariantInit.OLEAUT32(00000000), ref: 00C80D1F
                                                                                                                                                                                                                                                    • Part of subcall function 00C80CDF: VariantCopy.OLEAUT32(?,?), ref: 00C80D28
                                                                                                                                                                                                                                                    • Part of subcall function 00C80CDF: VariantClear.OLEAUT32(?), ref: 00C80D34
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                                                                                                                                                                                                                  • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                                                                                                                                                                                  • API String ID: 4137639002-1221869570
                                                                                                                                                                                                                                                  • Opcode ID: dccbf534b6e1f53d61099f2a4e1b7261c69603833dbd02d088eb6155ee1108fe
                                                                                                                                                                                                                                                  • Instruction ID: 9aa5a9f4648dfdcd15fc2ebcbc841e4b83edc6ac306afdef0c455f435ffec567
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: dccbf534b6e1f53d61099f2a4e1b7261c69603833dbd02d088eb6155ee1108fe
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 919198746083419FCB00EF64C48496AB7E4FF89314F14892EF89A9B351DB30EE46DB92
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C7000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00C6FF41,80070057,?,?,?,00C7035E), ref: 00C7002B
                                                                                                                                                                                                                                                    • Part of subcall function 00C7000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00C6FF41,80070057,?,?), ref: 00C70046
                                                                                                                                                                                                                                                    • Part of subcall function 00C7000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00C6FF41,80070057,?,?), ref: 00C70054
                                                                                                                                                                                                                                                    • Part of subcall function 00C7000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00C6FF41,80070057,?), ref: 00C70064
                                                                                                                                                                                                                                                  • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00C94C51
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C94D59
                                                                                                                                                                                                                                                  • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00C94DCF
                                                                                                                                                                                                                                                  • CoTaskMemFree.OLE32(?), ref: 00C94DDA
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                                                                                                                                                                                                                  • String ID: NULL Pointer assignment
                                                                                                                                                                                                                                                  • API String ID: 614568839-2785691316
                                                                                                                                                                                                                                                  • Opcode ID: 672db2963c193229af4316c6d75588531374d2c0ff64d5f39899a2eb1783ef43
                                                                                                                                                                                                                                                  • Instruction ID: dbbae78feccd10028025debe4100a0f9e63dfa0d66dda1984dd6178cdd19795a
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 672db2963c193229af4316c6d75588531374d2c0ff64d5f39899a2eb1783ef43
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 15911671D00219EFDF14DFA4C895EEEB7B8BF09314F10816AE919A7291EB309A45DF60
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetMenu.USER32(?), ref: 00CA2183
                                                                                                                                                                                                                                                  • GetMenuItemCount.USER32(00000000), ref: 00CA21B5
                                                                                                                                                                                                                                                  • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00CA21DD
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00CA2213
                                                                                                                                                                                                                                                  • GetMenuItemID.USER32(?,?), ref: 00CA224D
                                                                                                                                                                                                                                                  • GetSubMenu.USER32(?,?), ref: 00CA225B
                                                                                                                                                                                                                                                    • Part of subcall function 00C73A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00C73A57
                                                                                                                                                                                                                                                    • Part of subcall function 00C73A3D: GetCurrentThreadId.KERNEL32 ref: 00C73A5E
                                                                                                                                                                                                                                                    • Part of subcall function 00C73A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00C725B3), ref: 00C73A65
                                                                                                                                                                                                                                                  • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00CA22E3
                                                                                                                                                                                                                                                    • Part of subcall function 00C7E97B: Sleep.KERNEL32 ref: 00C7E9F3
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 4196846111-0
                                                                                                                                                                                                                                                  • Opcode ID: e7d9458342b9f243f7e2cb792e6448d6f12c0a6911a7ee6f189cc980c92236a5
                                                                                                                                                                                                                                                  • Instruction ID: e7a1a425effe4f2738ca43d521bcb1f700fa1329d0cc4cbd116fe97e2a50c56f
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e7d9458342b9f243f7e2cb792e6448d6f12c0a6911a7ee6f189cc980c92236a5
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: DB71B335E00216AFCB10DFA8C881BAEB7F5EF4A324F108458E916EB351D734EE419B90
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • IsWindow.USER32(01466698), ref: 00CA7F37
                                                                                                                                                                                                                                                  • IsWindowEnabled.USER32(01466698), ref: 00CA7F43
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 00CA801E
                                                                                                                                                                                                                                                  • SendMessageW.USER32(01466698,000000B0,?,?), ref: 00CA8051
                                                                                                                                                                                                                                                  • IsDlgButtonChecked.USER32(?,?), ref: 00CA8089
                                                                                                                                                                                                                                                  • GetWindowLongW.USER32(01466698,000000EC), ref: 00CA80AB
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00CA80C3
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 4072528602-0
                                                                                                                                                                                                                                                  • Opcode ID: b5a636e1062723e9dfdb6a39ab7c01c58e21f79d71c4ea717c9322b3709cc409
                                                                                                                                                                                                                                                  • Instruction ID: 5ff05bace3e85225f4311eb59609bd73b8fce673d23c850028f42ff32774faf9
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: b5a636e1062723e9dfdb6a39ab7c01c58e21f79d71c4ea717c9322b3709cc409
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 48719D34608206AFEB21DF94CCD4FAA7BB9FF0B308F144159F96597261CB31AA55DB20
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetParent.USER32(?), ref: 00C7AEF9
                                                                                                                                                                                                                                                  • GetKeyboardState.USER32(?), ref: 00C7AF0E
                                                                                                                                                                                                                                                  • SetKeyboardState.USER32(?), ref: 00C7AF6F
                                                                                                                                                                                                                                                  • PostMessageW.USER32(?,00000101,00000010,?), ref: 00C7AF9D
                                                                                                                                                                                                                                                  • PostMessageW.USER32(?,00000101,00000011,?), ref: 00C7AFBC
                                                                                                                                                                                                                                                  • PostMessageW.USER32(?,00000101,00000012,?), ref: 00C7AFFD
                                                                                                                                                                                                                                                  • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00C7B020
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: MessagePost$KeyboardState$Parent
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 87235514-0
                                                                                                                                                                                                                                                  • Opcode ID: 4688906ac090826a93ac113c9ed6df3857baef8a7de03b18c524953368b93084
                                                                                                                                                                                                                                                  • Instruction ID: 086114510bd47e1c4864d8aaa98ab49b208d0606d8a3fb019c38b90a88c483c1
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4688906ac090826a93ac113c9ed6df3857baef8a7de03b18c524953368b93084
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: C851C1E06087D53DFB3682748845BBEBEA95B46304F08C589E1ED958C3C398AED4D751
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetParent.USER32(00000000), ref: 00C7AD19
                                                                                                                                                                                                                                                  • GetKeyboardState.USER32(?), ref: 00C7AD2E
                                                                                                                                                                                                                                                  • SetKeyboardState.USER32(?), ref: 00C7AD8F
                                                                                                                                                                                                                                                  • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00C7ADBB
                                                                                                                                                                                                                                                  • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00C7ADD8
                                                                                                                                                                                                                                                  • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00C7AE17
                                                                                                                                                                                                                                                  • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00C7AE38
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: MessagePost$KeyboardState$Parent
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 87235514-0
                                                                                                                                                                                                                                                  • Opcode ID: e22d98b5cd12958a560b682b8196e8c42791b30e2d7002ee6ca49d5f856728cc
                                                                                                                                                                                                                                                  • Instruction ID: f6a44ab7ec1f8439095392ef2265719d83ea5371a11eca2a843f522b27594c7f
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e22d98b5cd12958a560b682b8196e8c42791b30e2d7002ee6ca49d5f856728cc
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4951D6A15047D53DFB3683348C95BBE7EA96B86300F08C489E1ED468C3D294EE94E752
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetConsoleCP.KERNEL32(00C53CD6,?,?,?,?,?,?,?,?,00C45BA3,?,?,00C53CD6,?,?), ref: 00C45470
                                                                                                                                                                                                                                                  • __fassign.LIBCMT ref: 00C454EB
                                                                                                                                                                                                                                                  • __fassign.LIBCMT ref: 00C45506
                                                                                                                                                                                                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00C53CD6,00000005,00000000,00000000), ref: 00C4552C
                                                                                                                                                                                                                                                  • WriteFile.KERNEL32(?,00C53CD6,00000000,00C45BA3,00000000,?,?,?,?,?,?,?,?,?,00C45BA3,?), ref: 00C4554B
                                                                                                                                                                                                                                                  • WriteFile.KERNEL32(?,?,00000001,00C45BA3,00000000,?,?,?,?,?,?,?,?,?,00C45BA3,?), ref: 00C45584
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1324828854-0
                                                                                                                                                                                                                                                  • Opcode ID: de5afda4caaca981d0fc51550d453be4d37a525d4a6bfdda3aaa85da87dc339f
                                                                                                                                                                                                                                                  • Instruction ID: 87f799220b33e1268d50cd7cb76d57d4f8ffcccb486c60c6ff9d3fb40e050203
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: de5afda4caaca981d0fc51550d453be4d37a525d4a6bfdda3aaa85da87dc339f
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7651C3B1A00649AFDB11CFA8D885BEEBBF9FF09310F14411AF955E7292D7309A41CB60
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • _ValidateLocalCookies.LIBCMT ref: 00C32D4B
                                                                                                                                                                                                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00C32D53
                                                                                                                                                                                                                                                  • _ValidateLocalCookies.LIBCMT ref: 00C32DE1
                                                                                                                                                                                                                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00C32E0C
                                                                                                                                                                                                                                                  • _ValidateLocalCookies.LIBCMT ref: 00C32E61
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                                                                                                                                                                  • String ID: csm
                                                                                                                                                                                                                                                  • API String ID: 1170836740-1018135373
                                                                                                                                                                                                                                                  • Opcode ID: 0073106204bd138aa915a011456cb3cd79456d5cf3284cbb5c61a25f54efde63
                                                                                                                                                                                                                                                  • Instruction ID: f904f1f1777378d395fc78f1ea3065b82b53f8907ae2d776f204633d5ad1dcd6
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0073106204bd138aa915a011456cb3cd79456d5cf3284cbb5c61a25f54efde63
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3241D534E20209EBCF10DF68CC85A9EBBB5BF44325F148156E925AB392D731EA05CBD1
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C9304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00C9307A
                                                                                                                                                                                                                                                    • Part of subcall function 00C9304E: _wcslen.LIBCMT ref: 00C9309B
                                                                                                                                                                                                                                                  • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00C91112
                                                                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 00C91121
                                                                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 00C911C9
                                                                                                                                                                                                                                                  • closesocket.WSOCK32(00000000), ref: 00C911F9
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2675159561-0
                                                                                                                                                                                                                                                  • Opcode ID: 357c2c931211a55ffdde612fc36e237729619dfdb1d9daa842df05f72029b3ba
                                                                                                                                                                                                                                                  • Instruction ID: ce6fb58a3d4dde851fa4a73c497ec31783931eef653d6ac91d98dbcb9da2d875
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 357c2c931211a55ffdde612fc36e237729619dfdb1d9daa842df05f72029b3ba
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3741E731600205AFDB109F54C889BADB7E9FF46368F188059FD259B291C774EE81CBE1
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C7DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00C7CF22,?), ref: 00C7DDFD
                                                                                                                                                                                                                                                    • Part of subcall function 00C7DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00C7CF22,?), ref: 00C7DE16
                                                                                                                                                                                                                                                  • lstrcmpiW.KERNEL32(?,?), ref: 00C7CF45
                                                                                                                                                                                                                                                  • MoveFileW.KERNEL32(?,?), ref: 00C7CF7F
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C7D005
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C7D01B
                                                                                                                                                                                                                                                  • SHFileOperationW.SHELL32(?), ref: 00C7D061
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                                                                                                                                                                                                                  • String ID: \*.*
                                                                                                                                                                                                                                                  • API String ID: 3164238972-1173974218
                                                                                                                                                                                                                                                  • Opcode ID: f911568f0b69b129dc2a117e0aab97d15a8991a116a6ac7048a8994e3af6e7d3
                                                                                                                                                                                                                                                  • Instruction ID: ac7324059765c478c2d6bd2e929d7b73c0f0483c8f91b32f9264cb5b95657d9a
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: f911568f0b69b129dc2a117e0aab97d15a8991a116a6ac7048a8994e3af6e7d3
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 294154719052195FDF12EFA4C9C1BDEB7BCAF19380F0040EAE509EB142EA34A788DB50
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00CA2E1C
                                                                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00CA2E4F
                                                                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00CA2E84
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00CA2EB6
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00CA2EE0
                                                                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00CA2EF1
                                                                                                                                                                                                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00CA2F0B
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: LongWindow$MessageSend
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2178440468-0
                                                                                                                                                                                                                                                  • Opcode ID: 22d297d87d376fba98b81619aee8c252aca06bc0b584464b4fbc64b17598e45f
                                                                                                                                                                                                                                                  • Instruction ID: d9b30bedb621b1d4647a81da5e4fef2459cadffdda321c4c26ca688651948ae6
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 22d297d87d376fba98b81619aee8c252aca06bc0b584464b4fbc64b17598e45f
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2C31E2306041A2AFDB21CF5CDCC4FA937E1EB4A729F190164F9118F2A2CB71AD90DB41
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00C77769
                                                                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00C7778F
                                                                                                                                                                                                                                                  • SysAllocString.OLEAUT32(00000000), ref: 00C77792
                                                                                                                                                                                                                                                  • SysAllocString.OLEAUT32(?), ref: 00C777B0
                                                                                                                                                                                                                                                  • SysFreeString.OLEAUT32(?), ref: 00C777B9
                                                                                                                                                                                                                                                  • StringFromGUID2.OLE32(?,?,00000028), ref: 00C777DE
                                                                                                                                                                                                                                                  • SysAllocString.OLEAUT32(?), ref: 00C777EC
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3761583154-0
                                                                                                                                                                                                                                                  • Opcode ID: 8b0870fff4c871680d8f517f2d0d1778e93a9cf24b7567bf6b231bcbfb832cc4
                                                                                                                                                                                                                                                  • Instruction ID: 2f8b681f4cac58f69f02ff3b5b7b6c046a025bd39096de34bb8e1ca78d44147d
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8b0870fff4c871680d8f517f2d0d1778e93a9cf24b7567bf6b231bcbfb832cc4
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: E021AE7660421DAFDB15DFA8DC88EBF77ACEB093647008125BA18DB190D670DD42C764
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00C77842
                                                                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00C77868
                                                                                                                                                                                                                                                  • SysAllocString.OLEAUT32(00000000), ref: 00C7786B
                                                                                                                                                                                                                                                  • SysAllocString.OLEAUT32 ref: 00C7788C
                                                                                                                                                                                                                                                  • SysFreeString.OLEAUT32 ref: 00C77895
                                                                                                                                                                                                                                                  • StringFromGUID2.OLE32(?,?,00000028), ref: 00C778AF
                                                                                                                                                                                                                                                  • SysAllocString.OLEAUT32(?), ref: 00C778BD
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3761583154-0
                                                                                                                                                                                                                                                  • Opcode ID: 71332c805b9633c66a6c207b69eeae365d858f4e0ac805f6a467d69923f69601
                                                                                                                                                                                                                                                  • Instruction ID: 31c8666d4d915d2022d49ae9bb2f21b20e8fcd57da2fa3d9e49674c98e5c2e44
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 71332c805b9633c66a6c207b69eeae365d858f4e0ac805f6a467d69923f69601
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 79216031608218AFDB109FB8DC8CEBA77ECEB09764710C225F919DB2A1DA74DD41CB65
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetStdHandle.KERNEL32(0000000C), ref: 00C804F2
                                                                                                                                                                                                                                                  • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00C8052E
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CreateHandlePipe
                                                                                                                                                                                                                                                  • String ID: nul
                                                                                                                                                                                                                                                  • API String ID: 1424370930-2873401336
                                                                                                                                                                                                                                                  • Opcode ID: 5ff784aae3ec35c7b596d3cf0f1a61676a931bbcdecedc13d70fd88b172e187c
                                                                                                                                                                                                                                                  • Instruction ID: 301d0c93f27dcfb515e0ac3741a19c7fdd7bedd640b5066f357c0f599820fb5b
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5ff784aae3ec35c7b596d3cf0f1a61676a931bbcdecedc13d70fd88b172e187c
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: E0217C71600305AFDB20AF29D844B9A77A4AF45728F304A29E8B1D72E0D7709A48CF28
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetStdHandle.KERNEL32(000000F6), ref: 00C805C6
                                                                                                                                                                                                                                                  • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00C80601
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CreateHandlePipe
                                                                                                                                                                                                                                                  • String ID: nul
                                                                                                                                                                                                                                                  • API String ID: 1424370930-2873401336
                                                                                                                                                                                                                                                  • Opcode ID: f940ea153e14d63a6cdbed656b53ceaca50c7a4fca16b47b449b80d11740c85b
                                                                                                                                                                                                                                                  • Instruction ID: 7ed307e476e188b329eae23dac8ed575e7ae2da17bc22abcffd59783f08d3018
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: f940ea153e14d63a6cdbed656b53ceaca50c7a4fca16b47b449b80d11740c85b
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2E217F755003059FDB60AF698C44B9A77E4AF96729F300B19FCB1E72E0E7709964CB28
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C1600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00C1604C
                                                                                                                                                                                                                                                    • Part of subcall function 00C1600E: GetStockObject.GDI32(00000011), ref: 00C16060
                                                                                                                                                                                                                                                    • Part of subcall function 00C1600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00C1606A
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00CA4112
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00CA411F
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00CA412A
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00CA4139
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00CA4145
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: MessageSend$CreateObjectStockWindow
                                                                                                                                                                                                                                                  • String ID: Msctls_Progress32
                                                                                                                                                                                                                                                  • API String ID: 1025951953-3636473452
                                                                                                                                                                                                                                                  • Opcode ID: 6ad7bb5f6e882fa5db2e689409164c9dfcaad99c42a02da9d58b02e4d00c91f1
                                                                                                                                                                                                                                                  • Instruction ID: ba8b3d0913f3e47db2225d08c9b001e1bb1d527a8f9c040e4155fbdbefc9d641
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6ad7bb5f6e882fa5db2e689409164c9dfcaad99c42a02da9d58b02e4d00c91f1
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2F1186B115011A7EEF119F64CC85EEB7F5DEF09798F014111FB18A6150C672DC61DBA4
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C4D7A3: _free.LIBCMT ref: 00C4D7CC
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C4D82D
                                                                                                                                                                                                                                                    • Part of subcall function 00C429C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00C4D7D1,00000000,00000000,00000000,00000000,?,00C4D7F8,00000000,00000007,00000000,?,00C4DBF5,00000000), ref: 00C429DE
                                                                                                                                                                                                                                                    • Part of subcall function 00C429C8: GetLastError.KERNEL32(00000000,?,00C4D7D1,00000000,00000000,00000000,00000000,?,00C4D7F8,00000000,00000007,00000000,?,00C4DBF5,00000000,00000000), ref: 00C429F0
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C4D838
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C4D843
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C4D897
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C4D8A2
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C4D8AD
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C4D8B8
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 776569668-0
                                                                                                                                                                                                                                                  • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                                                                                                                                                                                                  • Instruction ID: c5d0dc2b14f6a00394a91677fa80e57b9e5fcfa1156ee0aaeca74245a117bbc9
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 59115B71940B04ABEA21BFB1CC47FCB7BDCBF10700F800825B69AE6292DA75B505A660
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00C7DA74
                                                                                                                                                                                                                                                  • LoadStringW.USER32(00000000), ref: 00C7DA7B
                                                                                                                                                                                                                                                  • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00C7DA91
                                                                                                                                                                                                                                                  • LoadStringW.USER32(00000000), ref: 00C7DA98
                                                                                                                                                                                                                                                  • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00C7DADC
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  • %s (%d) : ==> %s: %s %s, xrefs: 00C7DAB9
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: HandleLoadModuleString$Message
                                                                                                                                                                                                                                                  • String ID: %s (%d) : ==> %s: %s %s
                                                                                                                                                                                                                                                  • API String ID: 4072794657-3128320259
                                                                                                                                                                                                                                                  • Opcode ID: bb1a78ba709b76baa6a73d4b5b437dd537c3f340a985b011039ca16d84eadf34
                                                                                                                                                                                                                                                  • Instruction ID: ea472d6e6f16dd1ee9c5ca5e881259c88919a6e4a409d05420a88f35a30d4fda
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: bb1a78ba709b76baa6a73d4b5b437dd537c3f340a985b011039ca16d84eadf34
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: C1014FF25002087BE710DBA09DC9FEA726CEB09705F404496B70AE3041EA749E848B74
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • InterlockedExchange.KERNEL32(0145FB68,0145FB68), ref: 00C8097B
                                                                                                                                                                                                                                                  • EnterCriticalSection.KERNEL32(0145FB48,00000000), ref: 00C8098D
                                                                                                                                                                                                                                                  • TerminateThread.KERNEL32(?,000001F6), ref: 00C8099B
                                                                                                                                                                                                                                                  • WaitForSingleObject.KERNEL32(?,000003E8), ref: 00C809A9
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?), ref: 00C809B8
                                                                                                                                                                                                                                                  • InterlockedExchange.KERNEL32(0145FB68,000001F6), ref: 00C809C8
                                                                                                                                                                                                                                                  • LeaveCriticalSection.KERNEL32(0145FB48), ref: 00C809CF
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3495660284-0
                                                                                                                                                                                                                                                  • Opcode ID: 4da88825e253aab746a1c339b4746d3066cc485b6f352a0703810abe80a005e5
                                                                                                                                                                                                                                                  • Instruction ID: 2dc40fe32902d32fc681ecf536aa1ebef526f413371b957bfcaf551ff57c2427
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4da88825e253aab746a1c339b4746d3066cc485b6f352a0703810abe80a005e5
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A0F03C32542A02BBD7415FA4EECCBDABB39FF0270AF502125F202928A1CB749575CF94
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetClientRect.USER32(?,?), ref: 00C15D30
                                                                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00C15D71
                                                                                                                                                                                                                                                  • ScreenToClient.USER32(?,?), ref: 00C15D99
                                                                                                                                                                                                                                                  • GetClientRect.USER32(?,?), ref: 00C15ED7
                                                                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00C15EF8
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Rect$Client$Window$Screen
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1296646539-0
                                                                                                                                                                                                                                                  • Opcode ID: c2096b0522782e0d5e3dc38332a6e9b3943c77f8a67c2ab60cab734128e3122b
                                                                                                                                                                                                                                                  • Instruction ID: 4171e58a5bca64fc30b6d54900d56ef02f72ccb2661aeaa7f932ddbed1129948
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c2096b0522782e0d5e3dc38332a6e9b3943c77f8a67c2ab60cab734128e3122b
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 15B17A78A00A4ADBDB14CFA9C4807EEB7F1FF49314F14841AE8A9D7250DB34AA91DB54
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • __allrem.LIBCMT ref: 00C400BA
                                                                                                                                                                                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00C400D6
                                                                                                                                                                                                                                                  • __allrem.LIBCMT ref: 00C400ED
                                                                                                                                                                                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00C4010B
                                                                                                                                                                                                                                                  • __allrem.LIBCMT ref: 00C40122
                                                                                                                                                                                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00C40140
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1992179935-0
                                                                                                                                                                                                                                                  • Opcode ID: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                                                                                                                                                                                                                  • Instruction ID: 4aaa9a8cb4931cb10da43ef37dbc1045fbbbb4af3b7bf2fd7cc240c55ce71b94
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3F81F572A407069BE724AE69CC42B6F73E8BF55324F24493EFA21D7281E770DE419B50
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C93149: select.WSOCK32(00000000,?,00000000,00000000,?,?,?,00000000,?,?,?,00C9101C,00000000,?,?,00000000), ref: 00C93195
                                                                                                                                                                                                                                                  • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00C91DC0
                                                                                                                                                                                                                                                  • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00C91DE1
                                                                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 00C91DF2
                                                                                                                                                                                                                                                  • inet_ntoa.WSOCK32(?), ref: 00C91E8C
                                                                                                                                                                                                                                                  • htons.WSOCK32(?,?,?,?,?), ref: 00C91EDB
                                                                                                                                                                                                                                                  • _strlen.LIBCMT ref: 00C91F35
                                                                                                                                                                                                                                                    • Part of subcall function 00C739E8: _strlen.LIBCMT ref: 00C739F2
                                                                                                                                                                                                                                                    • Part of subcall function 00C16D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000002,?,?,?,?,00C2CF58,?,?,?), ref: 00C16DBA
                                                                                                                                                                                                                                                    • Part of subcall function 00C16D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,?,?,?,00C2CF58,?,?,?), ref: 00C16DED
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ByteCharMultiWide_strlen$ErrorLasthtonsinet_ntoaselect
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1923757996-0
                                                                                                                                                                                                                                                  • Opcode ID: 139a33ce15e14dadb8f7740375fe08d012f43e61f3c46d3bf6f890bc78e6afbb
                                                                                                                                                                                                                                                  • Instruction ID: b2a58386308bd8286dc3a08a1fdc7f7c1706d3918acda515d1d280aa0d288756
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 139a33ce15e14dadb8f7740375fe08d012f43e61f3c46d3bf6f890bc78e6afbb
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 53A13631104341AFC714DF60C88AF6A77E5AF85318F58894CF8665B2E2CB31EE82DB91
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00C382D9,00C382D9,?,?,?,00C4644F,00000001,00000001,8BE85006), ref: 00C46258
                                                                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00C4644F,00000001,00000001,8BE85006,?,?,?), ref: 00C462DE
                                                                                                                                                                                                                                                  • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00C463D8
                                                                                                                                                                                                                                                  • __freea.LIBCMT ref: 00C463E5
                                                                                                                                                                                                                                                    • Part of subcall function 00C43820: RtlAllocateHeap.NTDLL(00000000,?,00CE1444,?,00C2FDF5,?,?,00C1A976,00000010,00CE1440,00C113FC,?,00C113C6,?,00C11129), ref: 00C43852
                                                                                                                                                                                                                                                  • __freea.LIBCMT ref: 00C463EE
                                                                                                                                                                                                                                                  • __freea.LIBCMT ref: 00C46413
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1414292761-0
                                                                                                                                                                                                                                                  • Opcode ID: 87545e721216235400a577f7e1301a8ac4174be23776b6df5a020829e1057a9c
                                                                                                                                                                                                                                                  • Instruction ID: b6a06c6f1ad50a1a51d698deab0a6b956828ddbd96378919e3391a7390e448c6
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 87545e721216235400a577f7e1301a8ac4174be23776b6df5a020829e1057a9c
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 55513172A00246ABEB258F60CC81FAF7BA9FF86710F144229FD15D7194EB34DD80D6A1
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C19CB3: _wcslen.LIBCMT ref: 00C19CBD
                                                                                                                                                                                                                                                    • Part of subcall function 00C9C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C9B6AE,?,?), ref: 00C9C9B5
                                                                                                                                                                                                                                                    • Part of subcall function 00C9C998: _wcslen.LIBCMT ref: 00C9C9F1
                                                                                                                                                                                                                                                    • Part of subcall function 00C9C998: _wcslen.LIBCMT ref: 00C9CA68
                                                                                                                                                                                                                                                    • Part of subcall function 00C9C998: _wcslen.LIBCMT ref: 00C9CA9E
                                                                                                                                                                                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C9BCCA
                                                                                                                                                                                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00C9BD25
                                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00C9BD6A
                                                                                                                                                                                                                                                  • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00C9BD99
                                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00C9BDF3
                                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 00C9BDFF
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1120388591-0
                                                                                                                                                                                                                                                  • Opcode ID: c6481fd701fc309e2f74e5059960a9eb1acedb0836009d84f5088644ded5c3b5
                                                                                                                                                                                                                                                  • Instruction ID: 8e9162ebd7cdb521720f0711c43c29f0a23ed51e3f777543fb9ea2a563b647f6
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c6481fd701fc309e2f74e5059960a9eb1acedb0836009d84f5088644ded5c3b5
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2181D031208241EFCB14DF24C999E6ABBE5FF85308F14855CF4594B2A2CB31EE45DB92
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • VariantInit.OLEAUT32(00000035), ref: 00C6F7B9
                                                                                                                                                                                                                                                  • SysAllocString.OLEAUT32(00000001), ref: 00C6F860
                                                                                                                                                                                                                                                  • VariantCopy.OLEAUT32(00C6FA64,00000000), ref: 00C6F889
                                                                                                                                                                                                                                                  • VariantClear.OLEAUT32(00C6FA64), ref: 00C6F8AD
                                                                                                                                                                                                                                                  • VariantCopy.OLEAUT32(00C6FA64,00000000), ref: 00C6F8B1
                                                                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 00C6F8BB
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Variant$ClearCopy$AllocInitString
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3859894641-0
                                                                                                                                                                                                                                                  • Opcode ID: 43cac0459593ccc0dfa9be6fad8fe8b6133516ce393377e7bda00fd71d6c87ce
                                                                                                                                                                                                                                                  • Instruction ID: 49f5afa76cdfa036bfbe3a1507b3bd40fea39def0ff8917f78671f13755a3da0
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 43cac0459593ccc0dfa9be6fad8fe8b6133516ce393377e7bda00fd71d6c87ce
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A551D835500310BADF30AF66E8D5769B3A5EF46310F24546EE906DF291DB708C42DB56
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C17620: _wcslen.LIBCMT ref: 00C17625
                                                                                                                                                                                                                                                    • Part of subcall function 00C16B57: _wcslen.LIBCMT ref: 00C16B6A
                                                                                                                                                                                                                                                  • GetOpenFileNameW.COMDLG32(00000058), ref: 00C894E5
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C89506
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C8952D
                                                                                                                                                                                                                                                  • GetSaveFileNameW.COMDLG32(00000058), ref: 00C89585
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: _wcslen$FileName$OpenSave
                                                                                                                                                                                                                                                  • String ID: X
                                                                                                                                                                                                                                                  • API String ID: 83654149-3081909835
                                                                                                                                                                                                                                                  • Opcode ID: c8621fddb252e9fa939ff5eff0b88b0918b70ca71bb2175d8e7ea3535760751a
                                                                                                                                                                                                                                                  • Instruction ID: 5932d36935d422364efdd8f72eb566603453afed043c3fa6b7ad214a4132ffe8
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c8621fddb252e9fa939ff5eff0b88b0918b70ca71bb2175d8e7ea3535760751a
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: CCE1B3315043009FD714EF24C881AAEB7E4FF85318F08896DF8999B2A2DB30ED45DB96
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C29BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00C29BB2
                                                                                                                                                                                                                                                  • BeginPaint.USER32(?,?,?), ref: 00C29241
                                                                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00C292A5
                                                                                                                                                                                                                                                  • ScreenToClient.USER32(?,?), ref: 00C292C2
                                                                                                                                                                                                                                                  • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00C292D3
                                                                                                                                                                                                                                                  • EndPaint.USER32(?,?,?,?,?), ref: 00C29321
                                                                                                                                                                                                                                                  • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00C671EA
                                                                                                                                                                                                                                                    • Part of subcall function 00C29339: BeginPath.GDI32(00000000), ref: 00C29357
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3050599898-0
                                                                                                                                                                                                                                                  • Opcode ID: 0d8f3ed64c7c804688e62e1ecfb4ac45deff12f4ef654225506753400823a1a9
                                                                                                                                                                                                                                                  • Instruction ID: 01c2724ca7703e05504bcc9e97a97e5b9f90bbdb30ed0202793cc30a4a9f332a
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0d8f3ed64c7c804688e62e1ecfb4ac45deff12f4ef654225506753400823a1a9
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1341AB71104310AFD720DF25ECC4FBE7BB8EB46724F040629F9A48B2A2C7309945DB61
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • InterlockedExchange.KERNEL32(?,000001F5), ref: 00C8080C
                                                                                                                                                                                                                                                  • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00C80847
                                                                                                                                                                                                                                                  • EnterCriticalSection.KERNEL32(?), ref: 00C80863
                                                                                                                                                                                                                                                  • LeaveCriticalSection.KERNEL32(?), ref: 00C808DC
                                                                                                                                                                                                                                                  • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00C808F3
                                                                                                                                                                                                                                                  • InterlockedExchange.KERNEL32(?,000001F6), ref: 00C80921
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3368777196-0
                                                                                                                                                                                                                                                  • Opcode ID: d2bce6a2fd5488a27473e97264dd2b2dfb556e69aab20450531993f8f45cf11a
                                                                                                                                                                                                                                                  • Instruction ID: 1419f58d7f9f3679ca31c99abf1284717b00d98ebdf3b89827a088d10fb2c6e0
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: d2bce6a2fd5488a27473e97264dd2b2dfb556e69aab20450531993f8f45cf11a
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5E414971A00205EBDF15AF54DC85BAA77B8FF05314F1440A9ED00AA297DB30DE65DBA4
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,00C6F3AB,00000000,?,?,00000000,?,00C6682C,00000004,00000000,00000000), ref: 00CA824C
                                                                                                                                                                                                                                                  • EnableWindow.USER32(?,00000000), ref: 00CA8272
                                                                                                                                                                                                                                                  • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00CA82D1
                                                                                                                                                                                                                                                  • ShowWindow.USER32(?,00000004), ref: 00CA82E5
                                                                                                                                                                                                                                                  • EnableWindow.USER32(?,00000001), ref: 00CA830B
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00CA832F
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Window$Show$Enable$MessageSend
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 642888154-0
                                                                                                                                                                                                                                                  • Opcode ID: 7b252f1eeb07d65b67bec318d550a688ff15b4a398115e517b86dbdeb110d888
                                                                                                                                                                                                                                                  • Instruction ID: 52c879f6b0fd249c131c663b3bcf52fc590871c7d5ab008eb7f8b04e863e9b0e
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7b252f1eeb07d65b67bec318d550a688ff15b4a398115e517b86dbdeb110d888
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: F141B430601645EFDF15CF14D8D9BE87BE0BB0B718F184269EA584F272CB31A959CB50
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • IsWindowVisible.USER32(?), ref: 00C74C95
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00C74CB2
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00C74CEA
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C74D08
                                                                                                                                                                                                                                                  • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00C74D10
                                                                                                                                                                                                                                                  • _wcsstr.LIBVCRUNTIME ref: 00C74D1A
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 72514467-0
                                                                                                                                                                                                                                                  • Opcode ID: 01f3048b002be259848accfdb0235c60f5a51b78f185cee2c8436f495c82b88d
                                                                                                                                                                                                                                                  • Instruction ID: 22404f61c250ac3c2063e47f742473ae5b922a5d56b8bb9b0b30f27d4f3deb1c
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 01f3048b002be259848accfdb0235c60f5a51b78f185cee2c8436f495c82b88d
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: FB21C531204214BBEB2A9B69EC49B7F7BACDF56750F108079F809CA191EB61DD0196A0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C13AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00C13A97,?,?,00C12E7F,?,?,?,00000000), ref: 00C13AC2
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C8587B
                                                                                                                                                                                                                                                  • CoInitialize.OLE32(00000000), ref: 00C85995
                                                                                                                                                                                                                                                  • CoCreateInstance.OLE32(00CAFCF8,00000000,00000001,00CAFB68,?), ref: 00C859AE
                                                                                                                                                                                                                                                  • CoUninitialize.OLE32 ref: 00C859CC
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                                                                                                                                                                                                                  • String ID: .lnk
                                                                                                                                                                                                                                                  • API String ID: 3172280962-24824748
                                                                                                                                                                                                                                                  • Opcode ID: aae30f6b250f2771df05e140a6241ac20956ca8a6545731f47344ce728957869
                                                                                                                                                                                                                                                  • Instruction ID: f81c3b16c5cab0a4a08d6f8ca8910ae4907bdc8282679ecbbecca69c8cdf438d
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: aae30f6b250f2771df05e140a6241ac20956ca8a6545731f47344ce728957869
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 26D174706047019FC704EF24C480A6ABBF2EF8A318F14495DF8999B361D771ED46DB92
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C70FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00C70FCA
                                                                                                                                                                                                                                                    • Part of subcall function 00C70FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00C70FD6
                                                                                                                                                                                                                                                    • Part of subcall function 00C70FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00C70FE5
                                                                                                                                                                                                                                                    • Part of subcall function 00C70FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00C70FEC
                                                                                                                                                                                                                                                    • Part of subcall function 00C70FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00C71002
                                                                                                                                                                                                                                                  • GetLengthSid.ADVAPI32(?,00000000,00C71335), ref: 00C717AE
                                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00C717BA
                                                                                                                                                                                                                                                  • HeapAlloc.KERNEL32(00000000), ref: 00C717C1
                                                                                                                                                                                                                                                  • CopySid.ADVAPI32(00000000,00000000,?), ref: 00C717DA
                                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000,00C71335), ref: 00C717EE
                                                                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00C717F5
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3008561057-0
                                                                                                                                                                                                                                                  • Opcode ID: 3551a6d869463f3ca03929be5cc3c5b556457d6ef96166a7a87e0176d41a6c34
                                                                                                                                                                                                                                                  • Instruction ID: e37089d4a2e2c42f9d9eabcde80b4b65caad4b31ab93cf2d1cddc64a73d041a7
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3551a6d869463f3ca03929be5cc3c5b556457d6ef96166a7a87e0176d41a6c34
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 99118E71600205FFDB189FA8CC89BAE7BADEB46359F188018F95597210D735AA44CB60
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00C714FF
                                                                                                                                                                                                                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00C71506
                                                                                                                                                                                                                                                  • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00C71515
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000004), ref: 00C71520
                                                                                                                                                                                                                                                  • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00C7154F
                                                                                                                                                                                                                                                  • DestroyEnvironmentBlock.USERENV(00000000), ref: 00C71563
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1413079979-0
                                                                                                                                                                                                                                                  • Opcode ID: bd265ad736208532a25f2548808aa4844a3a51f0832e34b93e8c60e9593404c7
                                                                                                                                                                                                                                                  • Instruction ID: a7ab0a41f4f3a70a2f747693a9ce26931c2e5bf570dfca32e727aa6b74eb3b66
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: bd265ad736208532a25f2548808aa4844a3a51f0832e34b93e8c60e9593404c7
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8111377250120DABDF118FA8DD89FDE7BA9EF49748F088025FE19A2160C375CE64DB60
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetLastError.KERNEL32(?,?,00C33379,00C32FE5), ref: 00C33390
                                                                                                                                                                                                                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00C3339E
                                                                                                                                                                                                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00C333B7
                                                                                                                                                                                                                                                  • SetLastError.KERNEL32(00000000,?,00C33379,00C32FE5), ref: 00C33409
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ErrorLastValue___vcrt_
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3852720340-0
                                                                                                                                                                                                                                                  • Opcode ID: 0a8a9ee01b2d09dcd15065f9ab777805edcb0435ae32bdebb85d79236182fd76
                                                                                                                                                                                                                                                  • Instruction ID: 5282f95c41a0cf2035faebaefc449905457dff64e2e2a0e26eebdfc92b05e5d0
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0a8a9ee01b2d09dcd15065f9ab777805edcb0435ae32bdebb85d79236182fd76
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8C01FC3362E352BEEA1537757CC675F6F54EB15379F20822AF520851F0EF115E02A544
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetLastError.KERNEL32(?,?,00C45686,00C53CD6,?,00000000,?,00C45B6A,?,?,?,?,?,00C3E6D1,?,00CD8A48), ref: 00C42D78
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C42DAB
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C42DD3
                                                                                                                                                                                                                                                  • SetLastError.KERNEL32(00000000,?,?,?,?,00C3E6D1,?,00CD8A48,00000010,00C14F4A,?,?,00000000,00C53CD6), ref: 00C42DE0
                                                                                                                                                                                                                                                  • SetLastError.KERNEL32(00000000,?,?,?,?,00C3E6D1,?,00CD8A48,00000010,00C14F4A,?,?,00000000,00C53CD6), ref: 00C42DEC
                                                                                                                                                                                                                                                  • _abort.LIBCMT ref: 00C42DF2
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ErrorLast$_free$_abort
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3160817290-0
                                                                                                                                                                                                                                                  • Opcode ID: ca11534c4a94321bdafe0233e52c5f152b01212705ec17b606aa92f72591365d
                                                                                                                                                                                                                                                  • Instruction ID: 9f92fb9d528a807a2e90e8bdb39cab40fec5c93ea01c579eaebf034efe114276
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: ca11534c4a94321bdafe0233e52c5f152b01212705ec17b606aa92f72591365d
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3EF0C832D05A0127C6226735BC4BF5E2669BFC27A5F740419F834931E2EF748901E160
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C29639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00C29693
                                                                                                                                                                                                                                                    • Part of subcall function 00C29639: SelectObject.GDI32(?,00000000), ref: 00C296A2
                                                                                                                                                                                                                                                    • Part of subcall function 00C29639: BeginPath.GDI32(?), ref: 00C296B9
                                                                                                                                                                                                                                                    • Part of subcall function 00C29639: SelectObject.GDI32(?,00000000), ref: 00C296E2
                                                                                                                                                                                                                                                  • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00CA8A4E
                                                                                                                                                                                                                                                  • LineTo.GDI32(?,00000003,00000000), ref: 00CA8A62
                                                                                                                                                                                                                                                  • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00CA8A70
                                                                                                                                                                                                                                                  • LineTo.GDI32(?,00000000,00000003), ref: 00CA8A80
                                                                                                                                                                                                                                                  • EndPath.GDI32(?), ref: 00CA8A90
                                                                                                                                                                                                                                                  • StrokePath.GDI32(?), ref: 00CA8AA0
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 43455801-0
                                                                                                                                                                                                                                                  • Opcode ID: 6c9679d85c7bf381e8683c0afedda8d4f08b9584b6c62aced81440dace4b715c
                                                                                                                                                                                                                                                  • Instruction ID: e0aeff70943373c35185885a3210e2507db008138e5294d4371857c6b0011cd4
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6c9679d85c7bf381e8683c0afedda8d4f08b9584b6c62aced81440dace4b715c
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8A11C97600015DFFDB129F94DC88FAE7F6DEB09354F048012BA199A1A1C7719E55DBA0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetDC.USER32(00000000), ref: 00C75218
                                                                                                                                                                                                                                                  • GetDeviceCaps.GDI32(00000000,00000058), ref: 00C75229
                                                                                                                                                                                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00C75230
                                                                                                                                                                                                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 00C75238
                                                                                                                                                                                                                                                  • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00C7524F
                                                                                                                                                                                                                                                  • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00C75261
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CapsDevice$Release
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1035833867-0
                                                                                                                                                                                                                                                  • Opcode ID: 717d7dfd5ce29b56335944d76196c09ac0d9967ca1600f5ca12b47b1ede77886
                                                                                                                                                                                                                                                  • Instruction ID: e4171eb19cfa9eaa1d8c990fbefe0965faaae8e9aee13a4ffd9d4492f6b943c1
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 717d7dfd5ce29b56335944d76196c09ac0d9967ca1600f5ca12b47b1ede77886
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5E014F75A00718BBEB109BA59C89B5EBFB8EB49751F044065FA04A7281D6709D01CBA0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00C11BF4
                                                                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000010,00000000), ref: 00C11BFC
                                                                                                                                                                                                                                                  • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00C11C07
                                                                                                                                                                                                                                                  • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00C11C12
                                                                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000011,00000000), ref: 00C11C1A
                                                                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 00C11C22
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Virtual
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 4278518827-0
                                                                                                                                                                                                                                                  • Opcode ID: 9c15082eb30354213bfee99d28cc4a66c50fe0e994b0b705d7193683cdf9161c
                                                                                                                                                                                                                                                  • Instruction ID: a7fc62f9d2dc1e5aea39aadbbc8d434e70a7c89904136cb1b4317f693ad8562c
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9c15082eb30354213bfee99d28cc4a66c50fe0e994b0b705d7193683cdf9161c
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4F0167B0902B5ABDE3008F6A8C85B56FFE8FF19354F04411BA15C4BA42C7F5A864CBE5
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00C7EB30
                                                                                                                                                                                                                                                  • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00C7EB46
                                                                                                                                                                                                                                                  • GetWindowThreadProcessId.USER32(?,?), ref: 00C7EB55
                                                                                                                                                                                                                                                  • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00C7EB64
                                                                                                                                                                                                                                                  • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00C7EB6E
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00C7EB75
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 839392675-0
                                                                                                                                                                                                                                                  • Opcode ID: 6d69720ed31fa258d2ac85c50687409cf44d8b2f450bd7b3a3fecd70b3d7a905
                                                                                                                                                                                                                                                  • Instruction ID: 718fa6ef987be03163bcba1bf5523845c0ee8e921c6a998176010cffea87ad1c
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6d69720ed31fa258d2ac85c50687409cf44d8b2f450bd7b3a3fecd70b3d7a905
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: E0F05472241158BBE7215B629C4DFEF3E7CEFCBB15F004159F611D2091DBA05A01C6B5
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetClientRect.USER32(?), ref: 00C67452
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001328,00000000,?), ref: 00C67469
                                                                                                                                                                                                                                                  • GetWindowDC.USER32(?), ref: 00C67475
                                                                                                                                                                                                                                                  • GetPixel.GDI32(00000000,?,?), ref: 00C67484
                                                                                                                                                                                                                                                  • ReleaseDC.USER32(?,00000000), ref: 00C67496
                                                                                                                                                                                                                                                  • GetSysColor.USER32(00000005), ref: 00C674B0
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 272304278-0
                                                                                                                                                                                                                                                  • Opcode ID: eafee67606e2c2619e46f29636934ebbe62e6cf44b356fda308da569ef87e539
                                                                                                                                                                                                                                                  • Instruction ID: c19e8b44d815096e33fba5e8ce59a9d3c11b92a4f5f9d0ac0619a008162c6d64
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: eafee67606e2c2619e46f29636934ebbe62e6cf44b356fda308da569ef87e539
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9E018B31400215EFDB209FA4DD88BAE7BB5FB05319F140560F926A31A0CF311E51EF50
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00C7187F
                                                                                                                                                                                                                                                  • UnloadUserProfile.USERENV(?,?), ref: 00C7188B
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?), ref: 00C71894
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?), ref: 00C7189C
                                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00C718A5
                                                                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00C718AC
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 146765662-0
                                                                                                                                                                                                                                                  • Opcode ID: adf68bbd5a7d9e55fdf4a205740ca9824df66b3c664218c7c2b0bd85868cc687
                                                                                                                                                                                                                                                  • Instruction ID: 62bde819576f4fee5bef881085fd59299cc01cbe0ab32f26c32817fd50090999
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: adf68bbd5a7d9e55fdf4a205740ca9824df66b3c664218c7c2b0bd85868cc687
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 85E0C236204101BBDA015BA1ED4CB8EBB69FB4AB26B108220F22582070CB329421DF50
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C17620: _wcslen.LIBCMT ref: 00C17625
                                                                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00C7C6EE
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C7C735
                                                                                                                                                                                                                                                  • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00C7C79C
                                                                                                                                                                                                                                                  • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00C7C7CA
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ItemMenu$Info_wcslen$Default
                                                                                                                                                                                                                                                  • String ID: 0
                                                                                                                                                                                                                                                  • API String ID: 1227352736-4108050209
                                                                                                                                                                                                                                                  • Opcode ID: 0362ec78b9eb9459a5a57344c9c8f71399bf73d4609cac1de1b7fba7ab5bc50b
                                                                                                                                                                                                                                                  • Instruction ID: 8f7e2fbbbc95839fb9609261427835f5d0f13e08b286aa437e51fe39382d3b9b
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0362ec78b9eb9459a5a57344c9c8f71399bf73d4609cac1de1b7fba7ab5bc50b
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1751E0716043029BD7189F29C8C5B6B77E8AF49310F048A2DF9A9D31E0DB70DA44DB52
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • ShellExecuteExW.SHELL32(0000003C), ref: 00C9AEA3
                                                                                                                                                                                                                                                    • Part of subcall function 00C17620: _wcslen.LIBCMT ref: 00C17625
                                                                                                                                                                                                                                                  • GetProcessId.KERNEL32(00000000), ref: 00C9AF38
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00C9AF67
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CloseExecuteHandleProcessShell_wcslen
                                                                                                                                                                                                                                                  • String ID: <$@
                                                                                                                                                                                                                                                  • API String ID: 146682121-1426351568
                                                                                                                                                                                                                                                  • Opcode ID: 6101f9619dbb7ad945b1f4bd2b126b1b30392909739453f7be866b0125c0d86e
                                                                                                                                                                                                                                                  • Instruction ID: ce82d40013ed6299231c3e67edfd3d5aef691ff28be89dfea2edf210534ab247
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6101f9619dbb7ad945b1f4bd2b126b1b30392909739453f7be866b0125c0d86e
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: F9713871A00219DFCF14DF94C488A9EBBF1EF09314F048499E816AB762CB75EE85DB91
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00C77206
                                                                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00C7723C
                                                                                                                                                                                                                                                  • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00C7724D
                                                                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00C772CF
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ErrorMode$AddressCreateInstanceProc
                                                                                                                                                                                                                                                  • String ID: DllGetClassObject
                                                                                                                                                                                                                                                  • API String ID: 753597075-1075368562
                                                                                                                                                                                                                                                  • Opcode ID: da6130c0734fe0a5f8ac12bd44f513c1870dad31bbde2ac1b06d8e225452f560
                                                                                                                                                                                                                                                  • Instruction ID: 506bcb1d31aa68f733fe41f21b06f41c1d7810e488537d68825b2059f5e48b3e
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: da6130c0734fe0a5f8ac12bd44f513c1870dad31bbde2ac1b06d8e225452f560
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: E6418DB1A04208EFDB15CF54C885B9A7BA9EF45314F15C1A9BD19DF20AD7B0DA40DBA0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00CA3E35
                                                                                                                                                                                                                                                  • IsMenu.USER32(?), ref: 00CA3E4A
                                                                                                                                                                                                                                                  • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00CA3E92
                                                                                                                                                                                                                                                  • DrawMenuBar.USER32 ref: 00CA3EA5
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Menu$Item$DrawInfoInsert
                                                                                                                                                                                                                                                  • String ID: 0
                                                                                                                                                                                                                                                  • API String ID: 3076010158-4108050209
                                                                                                                                                                                                                                                  • Opcode ID: 5fbdc4104f6fcf804c9f3c088e9fa71dcc12b050afb0a20e43081ba738e865c3
                                                                                                                                                                                                                                                  • Instruction ID: 23194faa5fed38004303c81a012b35da43568c2b3ba4519e145302458d167ca2
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5fbdc4104f6fcf804c9f3c088e9fa71dcc12b050afb0a20e43081ba738e865c3
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1A416A75A0124AEFDB10DF50D894AEABBB9FF4A358F04402AF9159B250D730AE50DF50
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C19CB3: _wcslen.LIBCMT ref: 00C19CBD
                                                                                                                                                                                                                                                    • Part of subcall function 00C73CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00C73CCA
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00C71E66
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00C71E79
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000189,?,00000000), ref: 00C71EA9
                                                                                                                                                                                                                                                    • Part of subcall function 00C16B57: _wcslen.LIBCMT ref: 00C16B6A
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: MessageSend$_wcslen$ClassName
                                                                                                                                                                                                                                                  • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                  • API String ID: 2081771294-1403004172
                                                                                                                                                                                                                                                  • Opcode ID: 330ea4d6a5b210677137893dadc1df924350ad4dedb42f705f726ec3438154ee
                                                                                                                                                                                                                                                  • Instruction ID: 6089c48f3480e92414ed47c4ac14e59eaaa25bb9abe136cf502278b81864b2f3
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 330ea4d6a5b210677137893dadc1df924350ad4dedb42f705f726ec3438154ee
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: FC214971A00104BFDB149BA8DC5ADFFB7B8DF42354B148129FC69A31E0DB344A45A620
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: _wcslen
                                                                                                                                                                                                                                                  • String ID: HKEY_LOCAL_MACHINE$HKLM
                                                                                                                                                                                                                                                  • API String ID: 176396367-4004644295
                                                                                                                                                                                                                                                  • Opcode ID: 7b09b1a14ef1f87d1afe49b8a6d0ca7e50297c18525c4cca5a5b90549a316ea9
                                                                                                                                                                                                                                                  • Instruction ID: 301059b5e33cdba4b397f82598f20292b98beb8a1cef83d1d240fc5ab582244d
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7b09b1a14ef1f87d1afe49b8a6d0ca7e50297c18525c4cca5a5b90549a316ea9
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2231D572A001A94BCF20DE2CD9D41BE33919BA1750F55412AE865AB385FE71CF81F3A0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00CA2F8D
                                                                                                                                                                                                                                                  • LoadLibraryW.KERNEL32(?), ref: 00CA2F94
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00CA2FA9
                                                                                                                                                                                                                                                  • DestroyWindow.USER32(?), ref: 00CA2FB1
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: MessageSend$DestroyLibraryLoadWindow
                                                                                                                                                                                                                                                  • String ID: SysAnimate32
                                                                                                                                                                                                                                                  • API String ID: 3529120543-1011021900
                                                                                                                                                                                                                                                  • Opcode ID: 40f48bdcd1ab299f82e19f6da973b4ab93f115a41ce50ebba2adc8959178754d
                                                                                                                                                                                                                                                  • Instruction ID: 3ab828185e22be473cb1bbfb5e094ee1c93a50b0473ede383bc50503a77c7d07
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 40f48bdcd1ab299f82e19f6da973b4ab93f115a41ce50ebba2adc8959178754d
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8F218E71204226AFEB104FA8DC80FBB77B9EB5A36CF104619F960D6190D771DD91A760
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00C34D1E,00C428E9,?,00C34CBE,00C428E9,00CD88B8,0000000C,00C34E15,00C428E9,00000002), ref: 00C34D8D
                                                                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00C34DA0
                                                                                                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,00C34D1E,00C428E9,?,00C34CBE,00C428E9,00CD88B8,0000000C,00C34E15,00C428E9,00000002,00000000), ref: 00C34DC3
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                                                                                                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                                                                                                                                                                                                  • API String ID: 4061214504-1276376045
                                                                                                                                                                                                                                                  • Opcode ID: eee71ac125b8f790ec1914ce12af77729173d693399b5009432948e640a862f3
                                                                                                                                                                                                                                                  • Instruction ID: da7b8ece9206d2ab7934444a2674886cb9fc8cfe7d8412fd422a871b817668d8
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: eee71ac125b8f790ec1914ce12af77729173d693399b5009432948e640a862f3
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A7F04F35A50218BBDB159F94DC89BEEBFF5EF44755F1001A5F906A3260CF70AE40DA90
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00C14EDD,?,00CE1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00C14E9C
                                                                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00C14EAE
                                                                                                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,00C14EDD,?,00CE1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00C14EC0
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                                                                  • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                                                                                                                                                                                  • API String ID: 145871493-3689287502
                                                                                                                                                                                                                                                  • Opcode ID: e49798c01fbd1eca6d3d0f9366d2710822753251406b5e696bc540c34346b2cb
                                                                                                                                                                                                                                                  • Instruction ID: 1fea217f33125edcca3ae138d9685952d82a76406bb3c220bbb8ec9c907af52f
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e49798c01fbd1eca6d3d0f9366d2710822753251406b5e696bc540c34346b2cb
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: BBE0CD36B015225BD23117257C58BAFA554AF83F667050125FE04D3240DB60CE4154B1
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00C53CDE,?,00CE1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00C14E62
                                                                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00C14E74
                                                                                                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,00C53CDE,?,00CE1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00C14E87
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                                                                  • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                                                                                                                                                                                  • API String ID: 145871493-1355242751
                                                                                                                                                                                                                                                  • Opcode ID: d40dd69525ea1dd5c2c29287f2e3630acde5de0f3be1bd3152c34e99027996fb
                                                                                                                                                                                                                                                  • Instruction ID: 2bb1281f7142238e7de737be0f34ce43d41b2c800ef7d54c26feeba7189872b1
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: d40dd69525ea1dd5c2c29287f2e3630acde5de0f3be1bd3152c34e99027996fb
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 41D0C2366026235746221B247C08FCFAA18AF83B193050221FA00A3110CF21CE5291E0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00C82C05
                                                                                                                                                                                                                                                  • DeleteFileW.KERNEL32(?), ref: 00C82C87
                                                                                                                                                                                                                                                  • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00C82C9D
                                                                                                                                                                                                                                                  • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00C82CAE
                                                                                                                                                                                                                                                  • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00C82CC0
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: File$Delete$Copy
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3226157194-0
                                                                                                                                                                                                                                                  • Opcode ID: eb845127114b0d746d3fd63bfc50dc44c4ba8943435973d8848701df70430b8a
                                                                                                                                                                                                                                                  • Instruction ID: ab5c2f6627292c67927536d310c69987a53dc7a462d74883cf571680836fc9e5
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: eb845127114b0d746d3fd63bfc50dc44c4ba8943435973d8848701df70430b8a
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 72B17D71A00119ABDF25EFA4CC89EEEB7BCEF49314F0040A6F509E6141EA319A449F64
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetCurrentProcessId.KERNEL32 ref: 00C9A427
                                                                                                                                                                                                                                                  • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00C9A435
                                                                                                                                                                                                                                                  • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00C9A468
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?), ref: 00C9A63D
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Process$CloseCountersCurrentHandleOpen
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3488606520-0
                                                                                                                                                                                                                                                  • Opcode ID: 827b0be24a20e2fbc4b1b13d51f2516694028fb4e1e322ff4b85cba5091ea873
                                                                                                                                                                                                                                                  • Instruction ID: f47ebaee279ce20c6e5a25763d6909c04b5f2a91f02a81d2a2e233eaf0217ec6
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 827b0be24a20e2fbc4b1b13d51f2516694028fb4e1e322ff4b85cba5091ea873
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 33A1A1716043019FDB20DF28D886F2AB7E5AF84714F14881DF96A9B392DB70ED41DB92
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C7DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00C7CF22,?), ref: 00C7DDFD
                                                                                                                                                                                                                                                    • Part of subcall function 00C7DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00C7CF22,?), ref: 00C7DE16
                                                                                                                                                                                                                                                    • Part of subcall function 00C7E199: GetFileAttributesW.KERNEL32(?,00C7CF95), ref: 00C7E19A
                                                                                                                                                                                                                                                  • lstrcmpiW.KERNEL32(?,?), ref: 00C7E473
                                                                                                                                                                                                                                                  • MoveFileW.KERNEL32(?,?), ref: 00C7E4AC
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C7E5EB
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C7E603
                                                                                                                                                                                                                                                  • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00C7E650
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3183298772-0
                                                                                                                                                                                                                                                  • Opcode ID: 201f13a954fad27c1547fa19e06f19b4cf56a90d329e035f152cda862c8e4ea7
                                                                                                                                                                                                                                                  • Instruction ID: e854ee60e6ac36861f1b441a2c59904627254910c7fe17ea5423966e2dc87c4d
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 201f13a954fad27c1547fa19e06f19b4cf56a90d329e035f152cda862c8e4ea7
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 025182B35083455BC724EB90D891ADF73ECAF89340F00891EF699D3191EF74A688D766
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C19CB3: _wcslen.LIBCMT ref: 00C19CBD
                                                                                                                                                                                                                                                    • Part of subcall function 00C9C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C9B6AE,?,?), ref: 00C9C9B5
                                                                                                                                                                                                                                                    • Part of subcall function 00C9C998: _wcslen.LIBCMT ref: 00C9C9F1
                                                                                                                                                                                                                                                    • Part of subcall function 00C9C998: _wcslen.LIBCMT ref: 00C9CA68
                                                                                                                                                                                                                                                    • Part of subcall function 00C9C998: _wcslen.LIBCMT ref: 00C9CA9E
                                                                                                                                                                                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C9BAA5
                                                                                                                                                                                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00C9BB00
                                                                                                                                                                                                                                                  • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00C9BB63
                                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?,?), ref: 00C9BBA6
                                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00C9BBB3
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 826366716-0
                                                                                                                                                                                                                                                  • Opcode ID: 1edc7a8930ca236d3046f05dc5defb0b997134835f7dd97e1862e48aeceb0fe5
                                                                                                                                                                                                                                                  • Instruction ID: 6f6cdf2643cb2387a79f28f1b1ad3daad3093624fd1e2a53b42dd6ed816a6731
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1edc7a8930ca236d3046f05dc5defb0b997134835f7dd97e1862e48aeceb0fe5
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: D561B131208241AFD714DF14C5D4E6ABBE5FF85308F14855CF49A8B2A2DB31ED46DB92
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • VariantInit.OLEAUT32(?), ref: 00C78BCD
                                                                                                                                                                                                                                                  • VariantClear.OLEAUT32 ref: 00C78C3E
                                                                                                                                                                                                                                                  • VariantClear.OLEAUT32 ref: 00C78C9D
                                                                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 00C78D10
                                                                                                                                                                                                                                                  • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00C78D3B
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Variant$Clear$ChangeInitType
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 4136290138-0
                                                                                                                                                                                                                                                  • Opcode ID: c1359f2ca0c33f08e9ccb3bd78714b14a9995078b4b05103e81af0d347c53b2c
                                                                                                                                                                                                                                                  • Instruction ID: b1abe23b8b4e8dc1ce952cf6fda6d2b313010f12c2762d41a1b27f49aa827e7d
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c1359f2ca0c33f08e9ccb3bd78714b14a9995078b4b05103e81af0d347c53b2c
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: B7515AB5A0021AEFCB14CF68C894AAAB7F8FF9D314B158559E919DB350E730E911CF90
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00C88BAE
                                                                                                                                                                                                                                                  • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00C88BDA
                                                                                                                                                                                                                                                  • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00C88C32
                                                                                                                                                                                                                                                  • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00C88C57
                                                                                                                                                                                                                                                  • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00C88C5F
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: PrivateProfile$SectionWrite$String
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2832842796-0
                                                                                                                                                                                                                                                  • Opcode ID: fda61db13afc0b5ac79753ab9a50714f4cf7cb63219d268854c85bda92771b8f
                                                                                                                                                                                                                                                  • Instruction ID: bdc7fbc2dcff219b295016b474f2fc72baf5780d21315524468f0625539b4a98
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: fda61db13afc0b5ac79753ab9a50714f4cf7cb63219d268854c85bda92771b8f
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: F8514D35A002159FCB05DF64C881EADBBF5FF4A314F088458E849AB362DB31ED55EB90
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00C98F40
                                                                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00C98FD0
                                                                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00C98FEC
                                                                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00C99032
                                                                                                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 00C99052
                                                                                                                                                                                                                                                    • Part of subcall function 00C2F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00C81043,?,753CE610), ref: 00C2F6E6
                                                                                                                                                                                                                                                    • Part of subcall function 00C2F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00C6FA64,00000000,00000000,?,?,00C81043,?,753CE610,?,00C6FA64), ref: 00C2F70D
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 666041331-0
                                                                                                                                                                                                                                                  • Opcode ID: 81b1ca6c8c6a22252653000ffdcf1b044b63b18d7103bcd54be9710145e62ae4
                                                                                                                                                                                                                                                  • Instruction ID: a8ad85606f93104bda9b585467fe16505e695a43e2987c5681154cc39386a70b
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 81b1ca6c8c6a22252653000ffdcf1b044b63b18d7103bcd54be9710145e62ae4
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: B0513A35600205DFCB15DF58C4989ADBBF1FF4A314B0480A8E91A9B362DB31EE86DF90
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00CA6C33
                                                                                                                                                                                                                                                  • SetWindowLongW.USER32(?,000000EC,?), ref: 00CA6C4A
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00CA6C73
                                                                                                                                                                                                                                                  • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00C8AB79,00000000,00000000), ref: 00CA6C98
                                                                                                                                                                                                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00CA6CC7
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Window$Long$MessageSendShow
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3688381893-0
                                                                                                                                                                                                                                                  • Opcode ID: 7431b0559d88aa7e572abf47625feb42d022e5df2e7057b2c69450c69596d8cb
                                                                                                                                                                                                                                                  • Instruction ID: fabb9fb7dc11cd06010b933f15b71ec453d4f0f69fe82026282f96f5ecfe4a7c
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7431b0559d88aa7e572abf47625feb42d022e5df2e7057b2c69450c69596d8cb
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7441D435A04105AFD724DF38CC94FA97BA5EB0B36CF190228F8A5A72E1C771EE40DA50
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: _free
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 269201875-0
                                                                                                                                                                                                                                                  • Opcode ID: 02486860fd1d424121392623f8d10b6a46551600fc63ca2e71f70b904b95004f
                                                                                                                                                                                                                                                  • Instruction ID: b19240197a56ccea0a72bce3529d795c55f8f2b5eb6317d320186160d17c6c96
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 02486860fd1d424121392623f8d10b6a46551600fc63ca2e71f70b904b95004f
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6C41D232A002049FDB24DF78C882A5EB7F5FF89314F5545A9F516EB396DA31AE01DB80
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetCursorPos.USER32(?), ref: 00C29141
                                                                                                                                                                                                                                                  • ScreenToClient.USER32(00000000,?), ref: 00C2915E
                                                                                                                                                                                                                                                  • GetAsyncKeyState.USER32(00000001), ref: 00C29183
                                                                                                                                                                                                                                                  • GetAsyncKeyState.USER32(00000002), ref: 00C2919D
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: AsyncState$ClientCursorScreen
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 4210589936-0
                                                                                                                                                                                                                                                  • Opcode ID: c0428757d055ad37b03007490e9f55d15503c98d9ad3a9ddaaee89f549821b6c
                                                                                                                                                                                                                                                  • Instruction ID: 9dacc6e59ed7bb2fa65dbb122126fdfcaeb5d2635c6a16536231ff5059e6c75d
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c0428757d055ad37b03007490e9f55d15503c98d9ad3a9ddaaee89f549821b6c
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3E415F7190861AABDF159F69D884BEEB774FB06328F204716E439A32D0C7345A50DB91
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetInputState.USER32 ref: 00C838CB
                                                                                                                                                                                                                                                  • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00C83922
                                                                                                                                                                                                                                                  • TranslateMessage.USER32(?), ref: 00C8394B
                                                                                                                                                                                                                                                  • DispatchMessageW.USER32(?), ref: 00C83955
                                                                                                                                                                                                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00C83966
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2256411358-0
                                                                                                                                                                                                                                                  • Opcode ID: e887c418916292665a58f17da1e37e9e88640ae6f44945564ab405148d25e1c1
                                                                                                                                                                                                                                                  • Instruction ID: 396f0db20c75396455cb4709baed9ceba361d67a789717ec0c0139a84f5021bb
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e887c418916292665a58f17da1e37e9e88640ae6f44945564ab405148d25e1c1
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: D231C4709043C19EEB35EB35D888BBA37A8AB05718F08156DE876870E0E7B49B85DB15
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,00C8C21E,00000000), ref: 00C8CF38
                                                                                                                                                                                                                                                  • InternetReadFile.WININET(?,00000000,?,?), ref: 00C8CF6F
                                                                                                                                                                                                                                                  • GetLastError.KERNEL32(?,00000000,?,?,?,00C8C21E,00000000), ref: 00C8CFB4
                                                                                                                                                                                                                                                  • SetEvent.KERNEL32(?,?,00000000,?,?,?,00C8C21E,00000000), ref: 00C8CFC8
                                                                                                                                                                                                                                                  • SetEvent.KERNEL32(?,?,00000000,?,?,?,00C8C21E,00000000), ref: 00C8CFF2
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3191363074-0
                                                                                                                                                                                                                                                  • Opcode ID: 32b8154d03c4636098de85568f5ae19eed5700335ee0ab49fa0b797a68747af2
                                                                                                                                                                                                                                                  • Instruction ID: d5f1868f06fd41a5020069fce40b4d6cf5a62c3e7e459896911ebe742689cc31
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 32b8154d03c4636098de85568f5ae19eed5700335ee0ab49fa0b797a68747af2
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2A314A71604205AFEB20EFE5D8C4AAFBBF9EB15359B10442EF616D3150DB30AE41DB64
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00C71915
                                                                                                                                                                                                                                                  • PostMessageW.USER32(00000001,00000201,00000001), ref: 00C719C1
                                                                                                                                                                                                                                                  • Sleep.KERNEL32(00000000,?,?,?), ref: 00C719C9
                                                                                                                                                                                                                                                  • PostMessageW.USER32(00000001,00000202,00000000), ref: 00C719DA
                                                                                                                                                                                                                                                  • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00C719E2
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: MessagePostSleep$RectWindow
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3382505437-0
                                                                                                                                                                                                                                                  • Opcode ID: 8e04a7f14d2d1f2696da8696939f6f345169df97f071ec9970f9d2ef6472a2bf
                                                                                                                                                                                                                                                  • Instruction ID: d33da82fc581b4ecf88efacc7979625b46d0d479b705b20d83128c60197a5489
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8e04a7f14d2d1f2696da8696939f6f345169df97f071ec9970f9d2ef6472a2bf
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4C31AD71A00219EFCB10CFACC999BDE3BB5EB45315F148229FE25A72D1C7709A55CB90
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00CA5745
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001074,?,00000001), ref: 00CA579D
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00CA57AF
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00CA57BA
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 00CA5816
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: MessageSend$_wcslen
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 763830540-0
                                                                                                                                                                                                                                                  • Opcode ID: aaebbe025575b96a743e53faa375b62ecf994364ae2d0d0f917f49ea1f9a8c66
                                                                                                                                                                                                                                                  • Instruction ID: ccdc12899dd236c23d61d852eb723e54197d7a75e03ee72afa841572a262523e
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: aaebbe025575b96a743e53faa375b62ecf994364ae2d0d0f917f49ea1f9a8c66
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8B217175914619DADB209FA1CC85AEE77BCFF06728F108216F929EB1C0D7709A85CF50
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • IsWindow.USER32(00000000), ref: 00C90951
                                                                                                                                                                                                                                                  • GetForegroundWindow.USER32 ref: 00C90968
                                                                                                                                                                                                                                                  • GetDC.USER32(00000000), ref: 00C909A4
                                                                                                                                                                                                                                                  • GetPixel.GDI32(00000000,?,00000003), ref: 00C909B0
                                                                                                                                                                                                                                                  • ReleaseDC.USER32(00000000,00000003), ref: 00C909E8
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Window$ForegroundPixelRelease
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 4156661090-0
                                                                                                                                                                                                                                                  • Opcode ID: c889d8587108f8c8bf25e82b7d7483836d405551573d10763aac045e565591c5
                                                                                                                                                                                                                                                  • Instruction ID: 32764b1aac556f408b76e7b936cd15e67fc6c2f11114647279d8e99f7a77e991
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c889d8587108f8c8bf25e82b7d7483836d405551573d10763aac045e565591c5
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3F219335600204AFD704EF65C988BAEBBF9EF45704F148468F85AE7352DB30AD45DB50
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetEnvironmentStringsW.KERNEL32 ref: 00C4CDC6
                                                                                                                                                                                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00C4CDE9
                                                                                                                                                                                                                                                    • Part of subcall function 00C43820: RtlAllocateHeap.NTDLL(00000000,?,00CE1444,?,00C2FDF5,?,?,00C1A976,00000010,00CE1440,00C113FC,?,00C113C6,?,00C11129), ref: 00C43852
                                                                                                                                                                                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00C4CE0F
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C4CE22
                                                                                                                                                                                                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00C4CE31
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 336800556-0
                                                                                                                                                                                                                                                  • Opcode ID: 1e6ff1423602e380e88ed5c00ce5724682d78a10909c2c8163d4757b70054281
                                                                                                                                                                                                                                                  • Instruction ID: ea07bd886d0eb9c83850cf7348a92847241fb4684646f49fc5c6d31d89eccc87
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1e6ff1423602e380e88ed5c00ce5724682d78a10909c2c8163d4757b70054281
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 280184726032157F276116B76CC8E7F696DFFC7BA53150129F915C7221EF618E0291B0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00C29693
                                                                                                                                                                                                                                                  • SelectObject.GDI32(?,00000000), ref: 00C296A2
                                                                                                                                                                                                                                                  • BeginPath.GDI32(?), ref: 00C296B9
                                                                                                                                                                                                                                                  • SelectObject.GDI32(?,00000000), ref: 00C296E2
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ObjectSelect$BeginCreatePath
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3225163088-0
                                                                                                                                                                                                                                                  • Opcode ID: f0f4e052ee40dca24412d6271d2ef15ca748077e77ae760ca1d974bcc11c6989
                                                                                                                                                                                                                                                  • Instruction ID: 5f6ac1c31ca30080bd953acf03588565ba5599bb8a7b5e2c625e2bcd9aed6b95
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: f0f4e052ee40dca24412d6271d2ef15ca748077e77ae760ca1d974bcc11c6989
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3A218030802355EBDB119F25FC88BAD3BB8FB01315F140216F820AB1B2D37499A1CF90
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: _memcmp
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2931989736-0
                                                                                                                                                                                                                                                  • Opcode ID: b37fcbc03c6e163636846b32fa46487886925fcfa423922f9029b60c270bfd1c
                                                                                                                                                                                                                                                  • Instruction ID: 5f1365d5740565f059f276c94699a8967c8861ecb13e1517458d30e1feccc306
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: b37fcbc03c6e163636846b32fa46487886925fcfa423922f9029b60c270bfd1c
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: BC01B5A166160ABFE21C55529D82FBB735C9B213A8F048034FD1C9A241F7B1EE5196B0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetLastError.KERNEL32(?,?,?,00C3F2DE,00C43863,00CE1444,?,00C2FDF5,?,?,00C1A976,00000010,00CE1440,00C113FC,?,00C113C6), ref: 00C42DFD
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C42E32
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C42E59
                                                                                                                                                                                                                                                  • SetLastError.KERNEL32(00000000,00C11129), ref: 00C42E66
                                                                                                                                                                                                                                                  • SetLastError.KERNEL32(00000000,00C11129), ref: 00C42E6F
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ErrorLast$_free
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3170660625-0
                                                                                                                                                                                                                                                  • Opcode ID: 58c2cb26508208c079a4a47db4a4cefc18bbb548c7fc324c0c9864c6584d7da8
                                                                                                                                                                                                                                                  • Instruction ID: adda5209417a560a065c70c62d2a5d01e01a3adf73e292cc56b86b5f37624545
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 58c2cb26508208c079a4a47db4a4cefc18bbb548c7fc324c0c9864c6584d7da8
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: FA01F43260660167CA1267366C87F6F2669BBD23A6BE40029F431E32A3EF74CD01A120
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00C6FF41,80070057,?,?,?,00C7035E), ref: 00C7002B
                                                                                                                                                                                                                                                  • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00C6FF41,80070057,?,?), ref: 00C70046
                                                                                                                                                                                                                                                  • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00C6FF41,80070057,?,?), ref: 00C70054
                                                                                                                                                                                                                                                  • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00C6FF41,80070057,?), ref: 00C70064
                                                                                                                                                                                                                                                  • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00C6FF41,80070057,?,?), ref: 00C70070
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3897988419-0
                                                                                                                                                                                                                                                  • Opcode ID: ee660adf0c313c44579a228422833e6a8b96572f4007c1e6c2da50107195b175
                                                                                                                                                                                                                                                  • Instruction ID: 14162b03d2dc074b54f4ff1eb9af76beef692ffff95eb12ac3eb8bce7b676739
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: ee660adf0c313c44579a228422833e6a8b96572f4007c1e6c2da50107195b175
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0F018F72600204FFDB104F69DC48BAE7BEDEB44766F248124F909D3210D779DE409BA0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • QueryPerformanceCounter.KERNEL32(?), ref: 00C7E997
                                                                                                                                                                                                                                                  • QueryPerformanceFrequency.KERNEL32(?), ref: 00C7E9A5
                                                                                                                                                                                                                                                  • Sleep.KERNEL32(00000000), ref: 00C7E9AD
                                                                                                                                                                                                                                                  • QueryPerformanceCounter.KERNEL32(?), ref: 00C7E9B7
                                                                                                                                                                                                                                                  • Sleep.KERNEL32 ref: 00C7E9F3
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2833360925-0
                                                                                                                                                                                                                                                  • Opcode ID: 829d73f68c671ae9f6c23f989a63d9913a920420df60f085f44ec2929094de10
                                                                                                                                                                                                                                                  • Instruction ID: 4e18c7f28a7ef5cdf624d1fe8092a59fed739ee978d7bf2840c80478ca3c481b
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 829d73f68c671ae9f6c23f989a63d9913a920420df60f085f44ec2929094de10
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: D6011732D01629DBCF00ABE5D899BEDBB78BF0E701F004596EA16B2251CB349655CBA1
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00C71114
                                                                                                                                                                                                                                                  • GetLastError.KERNEL32(?,00000000,00000000,?,?,00C70B9B,?,?,?), ref: 00C71120
                                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00C70B9B,?,?,?), ref: 00C7112F
                                                                                                                                                                                                                                                  • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00C70B9B,?,?,?), ref: 00C71136
                                                                                                                                                                                                                                                  • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00C7114D
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 842720411-0
                                                                                                                                                                                                                                                  • Opcode ID: 44d01111d23d7106b58d3e67612ab5314162627c8dec4f164e52cf41d2c5e68c
                                                                                                                                                                                                                                                  • Instruction ID: ff8d790bba3247bf815beb54ce1f44f01da9292ad32f034bfd7dcd0b6041220c
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 44d01111d23d7106b58d3e67612ab5314162627c8dec4f164e52cf41d2c5e68c
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 54011975200205BFDB114FA9DC89B6E3B6EEF8A3A4B644419FA45D7360DA31DD109A60
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00C70FCA
                                                                                                                                                                                                                                                  • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00C70FD6
                                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00C70FE5
                                                                                                                                                                                                                                                  • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00C70FEC
                                                                                                                                                                                                                                                  • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00C71002
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 44706859-0
                                                                                                                                                                                                                                                  • Opcode ID: c5c51e00411270c52d295d2499a871057943dbe585881e6fe411e4c1b0c740ca
                                                                                                                                                                                                                                                  • Instruction ID: 0413710c090de4d678ba7d218d2809fc4356613b905069b55a6431b558c9d188
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c5c51e00411270c52d295d2499a871057943dbe585881e6fe411e4c1b0c740ca
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: F6F04935200301AFDB214FA89C89F9A3BADEF8A766F144414FA49C7251DE70DC508A60
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00C7102A
                                                                                                                                                                                                                                                  • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00C71036
                                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00C71045
                                                                                                                                                                                                                                                  • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00C7104C
                                                                                                                                                                                                                                                  • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00C71062
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 44706859-0
                                                                                                                                                                                                                                                  • Opcode ID: cf7a583c2cbfc6dad122758e9660c36bdc6152b19820f59e80ea34dccf2a7663
                                                                                                                                                                                                                                                  • Instruction ID: f3cc19f1bd147346447bacb805fd39bfc7da7f92b008879763cb19203e3440df
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: cf7a583c2cbfc6dad122758e9660c36bdc6152b19820f59e80ea34dccf2a7663
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: B7F06D35200301FBDB215FA8EC89F9A3BADEF8A765F144414FE49C7250DE70D9508A60
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,00C8017D,?,00C832FC,?,00000001,00C52592,?), ref: 00C80324
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,00C8017D,?,00C832FC,?,00000001,00C52592,?), ref: 00C80331
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,00C8017D,?,00C832FC,?,00000001,00C52592,?), ref: 00C8033E
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,00C8017D,?,00C832FC,?,00000001,00C52592,?), ref: 00C8034B
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,00C8017D,?,00C832FC,?,00000001,00C52592,?), ref: 00C80358
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,00C8017D,?,00C832FC,?,00000001,00C52592,?), ref: 00C80365
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CloseHandle
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2962429428-0
                                                                                                                                                                                                                                                  • Opcode ID: 15bc48ef4fc0762d5dbef3ef42710a45e58db3678c8162e4c127d493377dd3e4
                                                                                                                                                                                                                                                  • Instruction ID: 2a60ff37e9850cc93963563cb14e4113a762db26c58cf2a8275f37eb79bb5b52
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 15bc48ef4fc0762d5dbef3ef42710a45e58db3678c8162e4c127d493377dd3e4
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 30019072801B159FCB30AF66D880416F7F5BF602193258A3ED1A652931C771AA58DF84
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C4D752
                                                                                                                                                                                                                                                    • Part of subcall function 00C429C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00C4D7D1,00000000,00000000,00000000,00000000,?,00C4D7F8,00000000,00000007,00000000,?,00C4DBF5,00000000), ref: 00C429DE
                                                                                                                                                                                                                                                    • Part of subcall function 00C429C8: GetLastError.KERNEL32(00000000,?,00C4D7D1,00000000,00000000,00000000,00000000,?,00C4D7F8,00000000,00000007,00000000,?,00C4DBF5,00000000,00000000), ref: 00C429F0
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C4D764
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C4D776
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C4D788
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C4D79A
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 776569668-0
                                                                                                                                                                                                                                                  • Opcode ID: defb73ef8943c9e2dfaf6213f52cf4238d4ed9aa37333cc01ba136eee1ebf9a0
                                                                                                                                                                                                                                                  • Instruction ID: 8059b41ae8f84a4d39d99ac8b9141c427788b722ee677d237092993823095de5
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: defb73ef8943c9e2dfaf6213f52cf4238d4ed9aa37333cc01ba136eee1ebf9a0
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: CDF09032541205AB8621FB69F9C2E1A7BDDBB04320BE40C06F05AE7546CB30FC80DA60
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003E9), ref: 00C75C58
                                                                                                                                                                                                                                                  • GetWindowTextW.USER32(00000000,?,00000100), ref: 00C75C6F
                                                                                                                                                                                                                                                  • MessageBeep.USER32(00000000), ref: 00C75C87
                                                                                                                                                                                                                                                  • KillTimer.USER32(?,0000040A), ref: 00C75CA3
                                                                                                                                                                                                                                                  • EndDialog.USER32(?,00000001), ref: 00C75CBD
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3741023627-0
                                                                                                                                                                                                                                                  • Opcode ID: 00d179fba3f3835c3bc3a8e705b708139bbe7e48329188c35ddf770ca150daba
                                                                                                                                                                                                                                                  • Instruction ID: 79400189d0d61fe3c6fe03756fa5865c5029b728fa854ac18697ca79ea441419
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 00d179fba3f3835c3bc3a8e705b708139bbe7e48329188c35ddf770ca150daba
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: F401A430500B04ABEB219B11DD8EFEA77B8BF05B09F044559B597A20E1DBF0AA84CB90
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C422BE
                                                                                                                                                                                                                                                    • Part of subcall function 00C429C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00C4D7D1,00000000,00000000,00000000,00000000,?,00C4D7F8,00000000,00000007,00000000,?,00C4DBF5,00000000), ref: 00C429DE
                                                                                                                                                                                                                                                    • Part of subcall function 00C429C8: GetLastError.KERNEL32(00000000,?,00C4D7D1,00000000,00000000,00000000,00000000,?,00C4D7F8,00000000,00000007,00000000,?,00C4DBF5,00000000,00000000), ref: 00C429F0
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C422D0
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C422E3
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C422F4
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C42305
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 776569668-0
                                                                                                                                                                                                                                                  • Opcode ID: 0a0586d1d3f7f103e70acfd57ec8bbbae2bc40712f664e8eb7d0c05fd380f512
                                                                                                                                                                                                                                                  • Instruction ID: 66c842e4adb97cf9d2489d04107457dd67596ea345800028d12b437593d7d792
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0a0586d1d3f7f103e70acfd57ec8bbbae2bc40712f664e8eb7d0c05fd380f512
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: ECF05E708011A19B9A22AF95BC83B0C3B68F728770794050BF810DE2B1C7715962FFE4
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • EndPath.GDI32(?), ref: 00C295D4
                                                                                                                                                                                                                                                  • StrokeAndFillPath.GDI32(?,?,00C671F7,00000000,?,?,?), ref: 00C295F0
                                                                                                                                                                                                                                                  • SelectObject.GDI32(?,00000000), ref: 00C29603
                                                                                                                                                                                                                                                  • DeleteObject.GDI32 ref: 00C29616
                                                                                                                                                                                                                                                  • StrokePath.GDI32(?), ref: 00C29631
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2625713937-0
                                                                                                                                                                                                                                                  • Opcode ID: e6d2a022b37d685a43a42dafe7ba8c0cf91592e152d7d9d54f808c2efe3252e3
                                                                                                                                                                                                                                                  • Instruction ID: 66c4a864678db802bce69f763be00c7b36f9d01d7e6a2709e031545fcc17929b
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e6d2a022b37d685a43a42dafe7ba8c0cf91592e152d7d9d54f808c2efe3252e3
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 60F03C30005244EBDB125F65ED9C7AC3BA1EB02326F088224F9255A4F2CB348AA1DF20
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: __freea$_free
                                                                                                                                                                                                                                                  • String ID: a/p$am/pm
                                                                                                                                                                                                                                                  • API String ID: 3432400110-3206640213
                                                                                                                                                                                                                                                  • Opcode ID: ffd513e567bdef884e48b25a0bd0795b0b8efa3f593113199d7ad124c9021967
                                                                                                                                                                                                                                                  • Instruction ID: 4215e8cc08471393e90bb90a8fec2391b4cc92512362a0e15fc1e021f168f297
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: ffd513e567bdef884e48b25a0bd0795b0b8efa3f593113199d7ad124c9021967
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 83D10331A10246CADB289F69C855BFEBBB0FF05710F2C4119EDA1AB661D3759EC0CB91
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C30242: EnterCriticalSection.KERNEL32(00CE070C,00CE1884,?,?,00C2198B,00CE2518,?,?,?,00C112F9,00000000), ref: 00C3024D
                                                                                                                                                                                                                                                    • Part of subcall function 00C30242: LeaveCriticalSection.KERNEL32(00CE070C,?,00C2198B,00CE2518,?,?,?,00C112F9,00000000), ref: 00C3028A
                                                                                                                                                                                                                                                    • Part of subcall function 00C19CB3: _wcslen.LIBCMT ref: 00C19CBD
                                                                                                                                                                                                                                                    • Part of subcall function 00C300A3: __onexit.LIBCMT ref: 00C300A9
                                                                                                                                                                                                                                                  • __Init_thread_footer.LIBCMT ref: 00C97BFB
                                                                                                                                                                                                                                                    • Part of subcall function 00C301F8: EnterCriticalSection.KERNEL32(00CE070C,?,?,00C28747,00CE2514), ref: 00C30202
                                                                                                                                                                                                                                                    • Part of subcall function 00C301F8: LeaveCriticalSection.KERNEL32(00CE070C,?,00C28747,00CE2514), ref: 00C30235
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                                                                                                                                                                                                                  • String ID: 5$G$Variable must be of type 'Object'.
                                                                                                                                                                                                                                                  • API String ID: 535116098-3733170431
                                                                                                                                                                                                                                                  • Opcode ID: 27ad1e7594f6926363e7d8f1c86ea96a46feea7a79cde332f406f0e5063dee16
                                                                                                                                                                                                                                                  • Instruction ID: 47940d927af1ffd3b063b5325eebaee9b2d956505bdac81f2749d2712eb2beef
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 27ad1e7594f6926363e7d8f1c86ea96a46feea7a79cde332f406f0e5063dee16
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: BA91BA71A15209EFCF04EF94C8999ADB7B1FF49304F108159F816AB292DB31AE81EB50
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C7B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00C721D0,?,?,00000034,00000800,?,00000034), ref: 00C7B42D
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00C72760
                                                                                                                                                                                                                                                    • Part of subcall function 00C7B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00C721FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00C7B3F8
                                                                                                                                                                                                                                                    • Part of subcall function 00C7B32A: GetWindowThreadProcessId.USER32(?,?), ref: 00C7B355
                                                                                                                                                                                                                                                    • Part of subcall function 00C7B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00C72194,00000034,?,?,00001004,00000000,00000000), ref: 00C7B365
                                                                                                                                                                                                                                                    • Part of subcall function 00C7B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00C72194,00000034,?,?,00001004,00000000,00000000), ref: 00C7B37B
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00C727CD
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00C7281A
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                                                                                                                                                                                  • String ID: @
                                                                                                                                                                                                                                                  • API String ID: 4150878124-2766056989
                                                                                                                                                                                                                                                  • Opcode ID: e4fec153c75e038a8380873b3ae54fe67aeaaffa9ee466d122e5e3eb61e1f8a6
                                                                                                                                                                                                                                                  • Instruction ID: b2d28a0531a3230f6ece25e137f0c2d5d4ed08069f3e59f59f9495ceeba29fe2
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e4fec153c75e038a8380873b3ae54fe67aeaaffa9ee466d122e5e3eb61e1f8a6
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 70411D72900218AFDB10DBA4CD85BDEBBB8AF05700F108095FA59B7191DB716F85DBA1
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 00C41769
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C41834
                                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00C4183E
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: _free$FileModuleName
                                                                                                                                                                                                                                                  • String ID: C:\Users\user\Desktop\file.exe
                                                                                                                                                                                                                                                  • API String ID: 2506810119-1957095476
                                                                                                                                                                                                                                                  • Opcode ID: 60b0ae86e996e5c41a4bef042ade8e5841648a69fc9cdf8007a25c28d73a684b
                                                                                                                                                                                                                                                  • Instruction ID: 822b92ce9563a0c3a8b11bb7eace1235aa42da7108b81c156af849da92989621
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 60b0ae86e996e5c41a4bef042ade8e5841648a69fc9cdf8007a25c28d73a684b
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1A318D71A00258ABDB21DF9ADC81E9EBBFCFB85310B194166FD549B251D6708A80DBA0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00C7C306
                                                                                                                                                                                                                                                  • DeleteMenu.USER32(?,00000007,00000000), ref: 00C7C34C
                                                                                                                                                                                                                                                  • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00CE1990,01466710), ref: 00C7C395
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Menu$Delete$InfoItem
                                                                                                                                                                                                                                                  • String ID: 0
                                                                                                                                                                                                                                                  • API String ID: 135850232-4108050209
                                                                                                                                                                                                                                                  • Opcode ID: d6786e713ae31df4c45ab18f47acefae11e0496939eadcde5b214afc9197d7d0
                                                                                                                                                                                                                                                  • Instruction ID: 283ec29dc1ff6d14d4f91d1f56df2398ed108f48e0decdf29a9ffedb7902109d
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: d6786e713ae31df4c45ab18f47acefae11e0496939eadcde5b214afc9197d7d0
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: E9419F712043029FD720DF25D8C4B9ABBE8AF85324F14CA1DF9A9972E1D730E904DB62
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00CACC08,00000000,?,?,?,?), ref: 00CA44AA
                                                                                                                                                                                                                                                  • GetWindowLongW.USER32 ref: 00CA44C7
                                                                                                                                                                                                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00CA44D7
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Window$Long
                                                                                                                                                                                                                                                  • String ID: SysTreeView32
                                                                                                                                                                                                                                                  • API String ID: 847901565-1698111956
                                                                                                                                                                                                                                                  • Opcode ID: 2cbc6f3cb31ee3d1ac85d592d30721fb79e40830d1655eeed6da7c5ea3b57530
                                                                                                                                                                                                                                                  • Instruction ID: 13f27307429f8300f17e72fd810abf7ca87c7068a955f46f006db778f1ea0a93
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2cbc6f3cb31ee3d1ac85d592d30721fb79e40830d1655eeed6da7c5ea3b57530
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: B8319E31210606AFDB248F78DC85BEA77A9EB4A338F204725F975931E0D7B0ED509B50
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C9335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00C93077,?,?), ref: 00C93378
                                                                                                                                                                                                                                                  • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00C9307A
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C9309B
                                                                                                                                                                                                                                                  • htons.WSOCK32(00000000,?,?,00000000), ref: 00C93106
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                                                                                                                                                                                                                  • String ID: 255.255.255.255
                                                                                                                                                                                                                                                  • API String ID: 946324512-2422070025
                                                                                                                                                                                                                                                  • Opcode ID: 6700053ab4bd15b74e2493be6521c353358a1ffcf813e85e28bc72f9b46bd0ce
                                                                                                                                                                                                                                                  • Instruction ID: 7c72c338673c71e96cb1f925612ae64421c5fc31e1430f612b9f0be7181cb01f
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6700053ab4bd15b74e2493be6521c353358a1ffcf813e85e28bc72f9b46bd0ce
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5B31B2352002819FCF20CF69C589AAA77E0EF55318F248059E9258B3A2D731EF45C760
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00CA3F40
                                                                                                                                                                                                                                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00CA3F54
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 00CA3F78
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: MessageSend$Window
                                                                                                                                                                                                                                                  • String ID: SysMonthCal32
                                                                                                                                                                                                                                                  • API String ID: 2326795674-1439706946
                                                                                                                                                                                                                                                  • Opcode ID: b2b9cbcffe0b8d39b1bd303d3441ed9b954683a0a63ee82167f4e55b2cfddde0
                                                                                                                                                                                                                                                  • Instruction ID: bc13426f21aaf9ab97688faf4aaea3d37672c61a728a427cf679cc47f78f0d60
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: b2b9cbcffe0b8d39b1bd303d3441ed9b954683a0a63ee82167f4e55b2cfddde0
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1621AB3261025ABFDF218E90CC86FEE3B79EB49718F110254FA156B1D0D6B1AD909BA0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00CA4705
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00CA4713
                                                                                                                                                                                                                                                  • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00CA471A
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: MessageSend$DestroyWindow
                                                                                                                                                                                                                                                  • String ID: msctls_updown32
                                                                                                                                                                                                                                                  • API String ID: 4014797782-2298589950
                                                                                                                                                                                                                                                  • Opcode ID: 6a0efa6eb90c4af59000b72789fab19e8329d80d0f338ac247f84b64903a538a
                                                                                                                                                                                                                                                  • Instruction ID: e1aea0e555df983eae506241229a44350f5d1eb0e008af96056286ec76757be4
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6a0efa6eb90c4af59000b72789fab19e8329d80d0f338ac247f84b64903a538a
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 38214FB5600245AFDB14DF68DCC1EAB37ADEB8B3A8B040059FA109B261DB70ED51DB60
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: _wcslen
                                                                                                                                                                                                                                                  • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                                                                                                                                                                                                  • API String ID: 176396367-2734436370
                                                                                                                                                                                                                                                  • Opcode ID: edd87ebb112eff2d91c7dcbc53afa3748d13cb5ada26cf7365379eb616807fb9
                                                                                                                                                                                                                                                  • Instruction ID: c2ea28e91db22af7f4fcb748357ffb6975dda1308749e840ba750ca560612e14
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: edd87ebb112eff2d91c7dcbc53afa3748d13cb5ada26cf7365379eb616807fb9
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: F0215B7210422166C371AB259C02FF773E8DF52314F10C13AF95D97181EB71AE86E2D5
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00CA3840
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00CA3850
                                                                                                                                                                                                                                                  • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00CA3876
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: MessageSend$MoveWindow
                                                                                                                                                                                                                                                  • String ID: Listbox
                                                                                                                                                                                                                                                  • API String ID: 3315199576-2633736733
                                                                                                                                                                                                                                                  • Opcode ID: c60cbb18111247e77ab5b07601fcda51528f1cf76cca9d2d47d17eea019c18ca
                                                                                                                                                                                                                                                  • Instruction ID: 17899ca5fa4353bf6f55f89fa64d045bd2458aa3816011b3a6176a9ddf4df162
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c60cbb18111247e77ab5b07601fcda51528f1cf76cca9d2d47d17eea019c18ca
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: AC21C272600119BBEF218F54CC85FBB376EEF8A758F118125F9109B190CA75DD51C7A0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 00C84A08
                                                                                                                                                                                                                                                  • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00C84A5C
                                                                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000000,?,?,00CACC08), ref: 00C84AD0
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ErrorMode$InformationVolume
                                                                                                                                                                                                                                                  • String ID: %lu
                                                                                                                                                                                                                                                  • API String ID: 2507767853-685833217
                                                                                                                                                                                                                                                  • Opcode ID: 29d89d47d3cd080e038d853636290b10e3d0eb43b76d76e72d5b9f7d8af1dcd5
                                                                                                                                                                                                                                                  • Instruction ID: a557e7babadff5fc9092584acdd8de989e9fba5c85535b5ff865d84a37e55b50
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 29d89d47d3cd080e038d853636290b10e3d0eb43b76d76e72d5b9f7d8af1dcd5
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 36315E75A00109AFDB14DF54C885EAE7BF8EF09308F1480A9E909DB252DB71EE46DB61
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00CA424F
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00CA4264
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00CA4271
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: MessageSend
                                                                                                                                                                                                                                                  • String ID: msctls_trackbar32
                                                                                                                                                                                                                                                  • API String ID: 3850602802-1010561917
                                                                                                                                                                                                                                                  • Opcode ID: 5aa600152367356e2ede077d37cb59a075bda46441984a127acf3d50623a6aee
                                                                                                                                                                                                                                                  • Instruction ID: c3c91cd1fa7115da5232395447d35d21ac2e62a0257276e15e325f07cca1561f
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5aa600152367356e2ede077d37cb59a075bda46441984a127acf3d50623a6aee
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: E8110631240249BEEF205F69CC46FAB3BACEFC6B58F010224FA55E6090D6B1DC519B50
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C16B57: _wcslen.LIBCMT ref: 00C16B6A
                                                                                                                                                                                                                                                    • Part of subcall function 00C72DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00C72DC5
                                                                                                                                                                                                                                                    • Part of subcall function 00C72DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00C72DD6
                                                                                                                                                                                                                                                    • Part of subcall function 00C72DA7: GetCurrentThreadId.KERNEL32 ref: 00C72DDD
                                                                                                                                                                                                                                                    • Part of subcall function 00C72DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00C72DE4
                                                                                                                                                                                                                                                  • GetFocus.USER32 ref: 00C72F78
                                                                                                                                                                                                                                                    • Part of subcall function 00C72DEE: GetParent.USER32(00000000), ref: 00C72DF9
                                                                                                                                                                                                                                                  • GetClassNameW.USER32(?,?,00000100), ref: 00C72FC3
                                                                                                                                                                                                                                                  • EnumChildWindows.USER32(?,00C7303B), ref: 00C72FEB
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                                                                                                                                                                                                                  • String ID: %s%d
                                                                                                                                                                                                                                                  • API String ID: 1272988791-1110647743
                                                                                                                                                                                                                                                  • Opcode ID: 0902b07d11f373bd931e906b3052739578e2f31c172ed499bb9b0c5c44c16b84
                                                                                                                                                                                                                                                  • Instruction ID: 3fd97b0e481e9e01e0beb031794a31dcd94ebfad357d2da23b2bd66543bd663e
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0902b07d11f373bd931e906b3052739578e2f31c172ed499bb9b0c5c44c16b84
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2F11B471600205ABCF14BF708CC5FEE376AAF95314F048079F90D9B252DE309A45EB60
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00CA58C1
                                                                                                                                                                                                                                                  • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00CA58EE
                                                                                                                                                                                                                                                  • DrawMenuBar.USER32(?), ref: 00CA58FD
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Menu$InfoItem$Draw
                                                                                                                                                                                                                                                  • String ID: 0
                                                                                                                                                                                                                                                  • API String ID: 3227129158-4108050209
                                                                                                                                                                                                                                                  • Opcode ID: e958a84c9764a40552f143b71567413cac2222a4e650dd359fc17c9f70ee60e9
                                                                                                                                                                                                                                                  • Instruction ID: 4f8fa94b027908ede11150ec3e534b7a28ecf11b31853a91f80b7293cfa3e2d8
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e958a84c9764a40552f143b71567413cac2222a4e650dd359fc17c9f70ee60e9
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: E5015B31500219EEDB219F61EC44BAFBBB4FF46364F10C0A9F849DA151DB308A85EF21
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                                  • Opcode ID: ede8fb18de77df23ab8ae2999d189d11258ceb8fc21b094576a4f3cd382b740b
                                                                                                                                                                                                                                                  • Instruction ID: bf810367d669ce40de15895ab143b7f237fefd1aca62a5aecf7d7ccc6cb716c3
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: ede8fb18de77df23ab8ae2999d189d11258ceb8fc21b094576a4f3cd382b740b
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A6C14D75A00206EFDB14CFA4C898BAEB7B5FF48714F208598E519EB261D731DE81CB90
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: __alldvrm$_strrchr
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1036877536-0
                                                                                                                                                                                                                                                  • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                                                                                                                                                                                                                  • Instruction ID: 0c4033bfdd9cca15180385251f3e7b1dc8a68c4bb808a8478c5af98e35f6fc46
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: ADA18B75D003869FEB29CF58C8817AEBBF4FF61350F2841ADE9959B281C6348E85C750
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Variant$ClearInitInitializeUninitialize
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1998397398-0
                                                                                                                                                                                                                                                  • Opcode ID: 3487feee87f4f9eba0da3e8f6cf728e08b691f0f79bcbd75fd21afd92649544f
                                                                                                                                                                                                                                                  • Instruction ID: 0a880b63225cc5ee6db78206bd95c1f970449a4d0b578d38ecb71c05fdcef19f
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3487feee87f4f9eba0da3e8f6cf728e08b691f0f79bcbd75fd21afd92649544f
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 40A15A752043009FCB10DF28C489A6AB7E5FF89714F048959F98A9B362DB30EE41DB92
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00CAFC08,?), ref: 00C705F0
                                                                                                                                                                                                                                                  • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00CAFC08,?), ref: 00C70608
                                                                                                                                                                                                                                                  • CLSIDFromProgID.OLE32(?,?,00000000,00CACC40,000000FF,?,00000000,00000800,00000000,?,00CAFC08,?), ref: 00C7062D
                                                                                                                                                                                                                                                  • _memcmp.LIBVCRUNTIME ref: 00C7064E
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: FromProg$FreeTask_memcmp
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 314563124-0
                                                                                                                                                                                                                                                  • Opcode ID: e64b1e4f90e53f55f6a35d9779c49738373131b1acf5592c6102a0aeb1ee6225
                                                                                                                                                                                                                                                  • Instruction ID: d2c11210e41d68fbecff97b9810cac46a5c31fa2006d8340d8b963adebdbb28d
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e64b1e4f90e53f55f6a35d9779c49738373131b1acf5592c6102a0aeb1ee6225
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: D3810971A00109EFCB04DF94C998EEEB7B9FF89315F208558F516AB250DB71AE46CB60
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 00C9A6AC
                                                                                                                                                                                                                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 00C9A6BA
                                                                                                                                                                                                                                                    • Part of subcall function 00C19CB3: _wcslen.LIBCMT ref: 00C19CBD
                                                                                                                                                                                                                                                  • Process32NextW.KERNEL32(00000000,?), ref: 00C9A79C
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00C9A7AB
                                                                                                                                                                                                                                                    • Part of subcall function 00C2CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00C53303,?), ref: 00C2CE8A
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1991900642-0
                                                                                                                                                                                                                                                  • Opcode ID: 90f73a9e9189488d412237ac539b229dce534d671b451239d280ccbfcd7afae2
                                                                                                                                                                                                                                                  • Instruction ID: 87d1226208ae7f8bd34dadf69b56f9e7adfb33f89a69ddd7400186edd0b8f14f
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 90f73a9e9189488d412237ac539b229dce534d671b451239d280ccbfcd7afae2
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 95517D71508300AFD710EF24D886AAFBBE8FF89754F00891DF595972A1EB30D945DB92
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: _free
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 269201875-0
                                                                                                                                                                                                                                                  • Opcode ID: 87c4556e3a89522d3ef0371576b45bc6402f4b76946a4a3a093a088fafe06fcd
                                                                                                                                                                                                                                                  • Instruction ID: 5aba925abd29f8beb4077d3c7ccf33ebe6c27fb98ab8e71e92c3c91ed112a8aa
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 87c4556e3a89522d3ef0371576b45bc6402f4b76946a4a3a093a088fafe06fcd
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: BC413C39A00110ABDB216BBA9C4DBBF3AA4FF41371F1C0625FC29D6192E77489C56276
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00CA62E2
                                                                                                                                                                                                                                                  • ScreenToClient.USER32(?,?), ref: 00CA6315
                                                                                                                                                                                                                                                  • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00CA6382
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Window$ClientMoveRectScreen
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3880355969-0
                                                                                                                                                                                                                                                  • Opcode ID: a97181196f1b3e8a26497a8d511912e8aadd9b1969062061d88956b25cfcd7a1
                                                                                                                                                                                                                                                  • Instruction ID: 7c5481b3c9d010ec1862a5c2c3e03ba74026578e7a048f2aab3d6e9a6eac37b5
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: a97181196f1b3e8a26497a8d511912e8aadd9b1969062061d88956b25cfcd7a1
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8951417490124AEFCF10DF54D880AAE7BB5FF56368F148259F9259B2A0D730EE51CB50
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • socket.WSOCK32(00000002,00000002,00000011), ref: 00C91AFD
                                                                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 00C91B0B
                                                                                                                                                                                                                                                  • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00C91B8A
                                                                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 00C91B94
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ErrorLast$socket
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1881357543-0
                                                                                                                                                                                                                                                  • Opcode ID: c054e288ad98910b18d739ad44aff3cf7201089b1f26e8c4f1f60a03a8841f86
                                                                                                                                                                                                                                                  • Instruction ID: 200a00f94d3c221fcf719407d7fbe7620feca400b7ee2ad86a27c9b7f1505161
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c054e288ad98910b18d739ad44aff3cf7201089b1f26e8c4f1f60a03a8841f86
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: D641F5746002016FDB20AF24C88AF6977E1AB45708F54C448F9258F7D3D772ED82DB90
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                                  • Opcode ID: c174c1ca4a87bc5859a5b10163de4c08073e2412e0b7d22c9d0a195126af4e80
                                                                                                                                                                                                                                                  • Instruction ID: 5c3bed0bbec07413a6630b1b4caa5487d81512a8c1155c84c4619ed77afa16c5
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c174c1ca4a87bc5859a5b10163de4c08073e2412e0b7d22c9d0a195126af4e80
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 32412475A00304AFD7259F38CC46BAABBE9FB88720F10852EF515DB282D371DE419790
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00C85783
                                                                                                                                                                                                                                                  • GetLastError.KERNEL32(?,00000000), ref: 00C857A9
                                                                                                                                                                                                                                                  • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00C857CE
                                                                                                                                                                                                                                                  • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00C857FA
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3321077145-0
                                                                                                                                                                                                                                                  • Opcode ID: b745f6ecd1ce92455132ba17ead7a92a9a90db42cdbb7110dc79fb12ff503a22
                                                                                                                                                                                                                                                  • Instruction ID: b62ff9f39496fa147d669e71d7d45dc89315c49291536f1921365bbb27e3fcce
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: b745f6ecd1ce92455132ba17ead7a92a9a90db42cdbb7110dc79fb12ff503a22
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 48414F35600610DFCB11EF15C484A5DBBF2EF4A324B18C488E85A9B362CB70FD41EB91
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,00C36D71,00000000,00000000,00C382D9,?,00C382D9,?,00000001,00C36D71,8BE85006,00000001,00C382D9,00C382D9), ref: 00C4D910
                                                                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00C4D999
                                                                                                                                                                                                                                                  • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00C4D9AB
                                                                                                                                                                                                                                                  • __freea.LIBCMT ref: 00C4D9B4
                                                                                                                                                                                                                                                    • Part of subcall function 00C43820: RtlAllocateHeap.NTDLL(00000000,?,00CE1444,?,00C2FDF5,?,?,00C1A976,00000010,00CE1440,00C113FC,?,00C113C6,?,00C11129), ref: 00C43852
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2652629310-0
                                                                                                                                                                                                                                                  • Opcode ID: d19955e6e9c138387eb7ebee117a1e13bb3ccaa1d55b1c41225a1b726c10049e
                                                                                                                                                                                                                                                  • Instruction ID: c93c7a0e11b1334ce12a8181bebb36c02fad338d2685c12c2fb0f968acf626d0
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: d19955e6e9c138387eb7ebee117a1e13bb3ccaa1d55b1c41225a1b726c10049e
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A231DE72A1020AABDF24AF65DC85EEE7BA5FB51310F050168FC15D7290EB35DE50DB90
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 00CA5352
                                                                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00CA5375
                                                                                                                                                                                                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00CA5382
                                                                                                                                                                                                                                                  • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00CA53A8
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: LongWindow$InvalidateMessageRectSend
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3340791633-0
                                                                                                                                                                                                                                                  • Opcode ID: 7d05e8e90c5006e27f1cf6129591d755fbaa0a51a349ca00936746477d49090a
                                                                                                                                                                                                                                                  • Instruction ID: f0fad2c10934fefcdd0aae7eebcbaf5fbcc273d8a1ac05b352171d69e40819e6
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7d05e8e90c5006e27f1cf6129591d755fbaa0a51a349ca00936746477d49090a
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: AD31E234A57A0AFFEF309A15CC45BEC3761AB87398F588101FA21961F1C7B09A80EB41
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00C7ABF1
                                                                                                                                                                                                                                                  • SetKeyboardState.USER32(00000080,?,00008000), ref: 00C7AC0D
                                                                                                                                                                                                                                                  • PostMessageW.USER32(00000000,00000101,00000000), ref: 00C7AC74
                                                                                                                                                                                                                                                  • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00C7ACC6
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: KeyboardState$InputMessagePostSend
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 432972143-0
                                                                                                                                                                                                                                                  • Opcode ID: a7ab3594870e0c8c4a3c93b17813048f5bc5257581671959f7fa0a1e9b66a305
                                                                                                                                                                                                                                                  • Instruction ID: b3f9143d2b2186561e2d54f2534493dc4c123f564b605f5d3111d0dba9b645a9
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: a7ab3594870e0c8c4a3c93b17813048f5bc5257581671959f7fa0a1e9b66a305
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 52310970A007187FEF36CB658C05BFE7BA5ABC5320F04C31AE4A9921D1C3768A859752
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • ClientToScreen.USER32(?,?), ref: 00CA769A
                                                                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00CA7710
                                                                                                                                                                                                                                                  • PtInRect.USER32(?,?,00CA8B89), ref: 00CA7720
                                                                                                                                                                                                                                                  • MessageBeep.USER32(00000000), ref: 00CA778C
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Rect$BeepClientMessageScreenWindow
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1352109105-0
                                                                                                                                                                                                                                                  • Opcode ID: 95e01629bd60ac802e9d681ae4d4d8956edf324f3211574d54fd8d5b44802ee2
                                                                                                                                                                                                                                                  • Instruction ID: 916cd8716ca0d9715b43372b60c2964471753130a24048519294b66dadcd353c
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 95e01629bd60ac802e9d681ae4d4d8956edf324f3211574d54fd8d5b44802ee2
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 97417F34605256DFCB02CF58CD98FAD77F5BB4A318F1942A8E824DB261D730AA41CB90
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetForegroundWindow.USER32 ref: 00CA16EB
                                                                                                                                                                                                                                                    • Part of subcall function 00C73A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00C73A57
                                                                                                                                                                                                                                                    • Part of subcall function 00C73A3D: GetCurrentThreadId.KERNEL32 ref: 00C73A5E
                                                                                                                                                                                                                                                    • Part of subcall function 00C73A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00C725B3), ref: 00C73A65
                                                                                                                                                                                                                                                  • GetCaretPos.USER32(?), ref: 00CA16FF
                                                                                                                                                                                                                                                  • ClientToScreen.USER32(00000000,?), ref: 00CA174C
                                                                                                                                                                                                                                                  • GetForegroundWindow.USER32 ref: 00CA1752
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2759813231-0
                                                                                                                                                                                                                                                  • Opcode ID: 01fc46f9a05f9b88213afbfd0f2c3a1950afcc48f7149e83ea338264a8dae047
                                                                                                                                                                                                                                                  • Instruction ID: d6c779cf39b1c52c281bbab8948a8c185a6c71c0e6ebfc01379a1fa6b6522880
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 01fc46f9a05f9b88213afbfd0f2c3a1950afcc48f7149e83ea338264a8dae047
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7031FD75D00249AFD704EFA9C8C19EEBBF9EF49308B5480AAE415E7211DB319E45DBA0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C17620: _wcslen.LIBCMT ref: 00C17625
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C7DFCB
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C7DFE2
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C7E00D
                                                                                                                                                                                                                                                  • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00C7E018
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: _wcslen$ExtentPoint32Text
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3763101759-0
                                                                                                                                                                                                                                                  • Opcode ID: 2d71594489efdf2a5d2b9d641ab2a516d921e724dbd216af3a29278010d5b877
                                                                                                                                                                                                                                                  • Instruction ID: 5abaf32e406a5420227cd1b86923abb9598fc132f939ffb733b79c7b86c9c293
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2d71594489efdf2a5d2b9d641ab2a516d921e724dbd216af3a29278010d5b877
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: BA21C772900214EFCB10DFA8D982BAEB7F8EF49760F148065F819BB241D6709E41DBE1
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C29BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00C29BB2
                                                                                                                                                                                                                                                  • GetCursorPos.USER32(?), ref: 00CA9001
                                                                                                                                                                                                                                                  • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00C67711,?,?,?,?,?), ref: 00CA9016
                                                                                                                                                                                                                                                  • GetCursorPos.USER32(?), ref: 00CA905E
                                                                                                                                                                                                                                                  • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00C67711,?,?,?), ref: 00CA9094
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2864067406-0
                                                                                                                                                                                                                                                  • Opcode ID: 803c39e579731314999c0377900d58c7e5d3ed6999ed5b7c45563e24d8f2795b
                                                                                                                                                                                                                                                  • Instruction ID: d16e7304fe97b12b47aca78934da05bad66936fba52a5ceb43d12aeab56d99d0
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 803c39e579731314999c0377900d58c7e5d3ed6999ed5b7c45563e24d8f2795b
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6921A135600018EFCB258F94DC99FFE7BB9EF4A3A4F144055F9154B261C7319AA0EB60
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetFileAttributesW.KERNEL32(?,00CACB68), ref: 00C7D2FB
                                                                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00C7D30A
                                                                                                                                                                                                                                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 00C7D319
                                                                                                                                                                                                                                                  • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00CACB68), ref: 00C7D376
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CreateDirectory$AttributesErrorFileLast
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2267087916-0
                                                                                                                                                                                                                                                  • Opcode ID: 0c15dcf6533da39e3085e257879be1df072d4a0061adcd4e539a1a1024036dd7
                                                                                                                                                                                                                                                  • Instruction ID: ac77682855c7eb104361a0e7742cdb78c686970b160e0ac272bc32bdb89ae22d
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0c15dcf6533da39e3085e257879be1df072d4a0061adcd4e539a1a1024036dd7
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: CD219F705092019F8700DF28C8819AE7BF4EF56328F108A1DF4AAC32A1DB31DA46DB93
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C71014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00C7102A
                                                                                                                                                                                                                                                    • Part of subcall function 00C71014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00C71036
                                                                                                                                                                                                                                                    • Part of subcall function 00C71014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00C71045
                                                                                                                                                                                                                                                    • Part of subcall function 00C71014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00C7104C
                                                                                                                                                                                                                                                    • Part of subcall function 00C71014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00C71062
                                                                                                                                                                                                                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00C715BE
                                                                                                                                                                                                                                                  • _memcmp.LIBVCRUNTIME ref: 00C715E1
                                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00C71617
                                                                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00C7161E
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1592001646-0
                                                                                                                                                                                                                                                  • Opcode ID: d6d2ca9dd2a555ebc30b5fb553a8d4a6b1ab718da199b27bf0e4f90ff8e7f497
                                                                                                                                                                                                                                                  • Instruction ID: 07b21b558c197a208dc36e6c5471785f229b340281421504dca6ba1966a62f09
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: d6d2ca9dd2a555ebc30b5fb553a8d4a6b1ab718da199b27bf0e4f90ff8e7f497
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: CD219D31E00108EFDF14DFA8C985BEEB7B8EF44354F188459E859AB241E730AA05DBA0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000EC), ref: 00CA280A
                                                                                                                                                                                                                                                  • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00CA2824
                                                                                                                                                                                                                                                  • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00CA2832
                                                                                                                                                                                                                                                  • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00CA2840
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Window$Long$AttributesLayered
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2169480361-0
                                                                                                                                                                                                                                                  • Opcode ID: ff1a11cb4a82c7c42676385bc5fedd32eeb50fa1734216111c8c6fe3f4571e32
                                                                                                                                                                                                                                                  • Instruction ID: 6671f2331eb03a1e6f7fdbeb2e848616b406083dcd89925dd82a6f7bb67b51f9
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: ff1a11cb4a82c7c42676385bc5fedd32eeb50fa1734216111c8c6fe3f4571e32
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: FA21D631604522AFD714DB28C884FAA7795EF47328F148158F426CB6D2CB75FD82DB90
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C78D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00C7790A,?,000000FF,?,00C78754,00000000,?,0000001C,?,?), ref: 00C78D8C
                                                                                                                                                                                                                                                    • Part of subcall function 00C78D7D: lstrcpyW.KERNEL32(00000000,?,?,00C7790A,?,000000FF,?,00C78754,00000000,?,0000001C,?,?,00000000), ref: 00C78DB2
                                                                                                                                                                                                                                                    • Part of subcall function 00C78D7D: lstrcmpiW.KERNEL32(00000000,?,00C7790A,?,000000FF,?,00C78754,00000000,?,0000001C,?,?), ref: 00C78DE3
                                                                                                                                                                                                                                                  • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00C78754,00000000,?,0000001C,?,?,00000000), ref: 00C77923
                                                                                                                                                                                                                                                  • lstrcpyW.KERNEL32(00000000,?,?,00C78754,00000000,?,0000001C,?,?,00000000), ref: 00C77949
                                                                                                                                                                                                                                                  • lstrcmpiW.KERNEL32(00000002,cdecl,?,00C78754,00000000,?,0000001C,?,?,00000000), ref: 00C77984
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: lstrcmpilstrcpylstrlen
                                                                                                                                                                                                                                                  • String ID: cdecl
                                                                                                                                                                                                                                                  • API String ID: 4031866154-3896280584
                                                                                                                                                                                                                                                  • Opcode ID: 24ad45557f9e7a8b88822bbf895666b1f0fd8c96d3b9e8729fd126da7197a100
                                                                                                                                                                                                                                                  • Instruction ID: 8b87fec604eb9bd397d83c8baa95700937b369a87ceedab6194062f441cd6345
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 24ad45557f9e7a8b88822bbf895666b1f0fd8c96d3b9e8729fd126da7197a100
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9611293A201306ABCF156F34D844E7B77A5FF95354B00812EFA0AC7264EF319901D791
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00CA7D0B
                                                                                                                                                                                                                                                  • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00CA7D2A
                                                                                                                                                                                                                                                  • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00CA7D42
                                                                                                                                                                                                                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00C8B7AD,00000000), ref: 00CA7D6B
                                                                                                                                                                                                                                                    • Part of subcall function 00C29BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00C29BB2
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Window$Long
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 847901565-0
                                                                                                                                                                                                                                                  • Opcode ID: 0ce250b49e09785377fd73658393102a587b5e8fbcc489d68604da372d36cb62
                                                                                                                                                                                                                                                  • Instruction ID: 8fc06cfc7570fb31406786ef29b5bf6fdac610739d85875fee2a74bb705575ca
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0ce250b49e09785377fd73658393102a587b5e8fbcc489d68604da372d36cb62
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8A117232A05666AFCB109F28DC44BAA3BA5BF46378B154724FC35DB2F0D7309A61DB50
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001060,?,00000004), ref: 00CA56BB
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00CA56CD
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00CA56D8
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 00CA5816
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: MessageSend_wcslen
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 455545452-0
                                                                                                                                                                                                                                                  • Opcode ID: 6ec7bb21334df91f0bc97f58413d40fbccd8353a0899db1e8c5f336ecb244c3d
                                                                                                                                                                                                                                                  • Instruction ID: 42b1f66983af257edb860582573f3a0c33b2f94e3f8b17e1614197cc6b18c95c
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6ec7bb21334df91f0bc97f58413d40fbccd8353a0899db1e8c5f336ecb244c3d
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0F11D67161060696DF20DFA1CC85BEE777CFF16768F108026F915D6181EB70DA84CB64
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                                  • Opcode ID: afddeadcbc29b5f95bc2aca3fde32aa40870ad21300480e10e9990fbe4601539
                                                                                                                                                                                                                                                  • Instruction ID: 9075460735c783393df60c030169f8fa17577131668e468f6c3cb28cbe572954
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: afddeadcbc29b5f95bc2aca3fde32aa40870ad21300480e10e9990fbe4601539
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2D0162F2A0561A7EF6122A796CC1F6B661DFF513B8B380325F971511D2DB709D805170
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 00C71A47
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00C71A59
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00C71A6F
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00C71A8A
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: MessageSend
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3850602802-0
                                                                                                                                                                                                                                                  • Opcode ID: a196a008e0c3c052f4c139452cae163117fb30130b9eeae20d9096db1db0de60
                                                                                                                                                                                                                                                  • Instruction ID: f6e7898f527be73c3e4cf92757fc2ee7a15e1534ebfb2cb59f9cad27c998c0cb
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: a196a008e0c3c052f4c139452cae163117fb30130b9eeae20d9096db1db0de60
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 80113C3AD01219FFEB10DBA9CD85FADBB78EB04750F244091EA04B7290D6716F50EB94
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00C7E1FD
                                                                                                                                                                                                                                                  • MessageBoxW.USER32(?,?,?,?), ref: 00C7E230
                                                                                                                                                                                                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00C7E246
                                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00C7E24D
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2880819207-0
                                                                                                                                                                                                                                                  • Opcode ID: df03e39e71391a12fcb1e50cd7e29230fb3d258fadb246641a7ea3808403ca58
                                                                                                                                                                                                                                                  • Instruction ID: cbc07bc6691a5328735b001323400aac0395463f26ccec592543d149efa3a5f8
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: df03e39e71391a12fcb1e50cd7e29230fb3d258fadb246641a7ea3808403ca58
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: B411DB76A04258BBC7019FA89C49BDF7FAD9B45324F148255F929D7291D670CE0487A0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • CreateThread.KERNEL32(00000000,?,00C3CFF9,00000000,00000004,00000000), ref: 00C3D218
                                                                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00C3D224
                                                                                                                                                                                                                                                  • __dosmaperr.LIBCMT ref: 00C3D22B
                                                                                                                                                                                                                                                  • ResumeThread.KERNEL32(00000000), ref: 00C3D249
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 173952441-0
                                                                                                                                                                                                                                                  • Opcode ID: d23917b1d61295f8aaf363ef021270cbffb0bb7a592a21814d5d14185329e032
                                                                                                                                                                                                                                                  • Instruction ID: b959118ee4db5718603a897211dc6d413b03ab367672c10380d8451c6f93117f
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: d23917b1d61295f8aaf363ef021270cbffb0bb7a592a21814d5d14185329e032
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: C601F976825104BBCB115BA6EC45BAF7A6DDF82731F100219F936921D0CF72CD01D7A0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C29BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00C29BB2
                                                                                                                                                                                                                                                  • GetClientRect.USER32(?,?), ref: 00CA9F31
                                                                                                                                                                                                                                                  • GetCursorPos.USER32(?), ref: 00CA9F3B
                                                                                                                                                                                                                                                  • ScreenToClient.USER32(?,?), ref: 00CA9F46
                                                                                                                                                                                                                                                  • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00CA9F7A
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Client$CursorLongProcRectScreenWindow
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 4127811313-0
                                                                                                                                                                                                                                                  • Opcode ID: 5a5914165a21a506a7864678fe205424a945c46653053709a7206b0f14d61f68
                                                                                                                                                                                                                                                  • Instruction ID: fcef0515bffe715831334f6811d2ed116d3315dd563ec631a2084cd9e1bcc205
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5a5914165a21a506a7864678fe205424a945c46653053709a7206b0f14d61f68
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: DA11453290015AAFDF10DFA8DC8AAEE77B8FB06319F000451FA11E3140D330BA91DBA1
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00C1604C
                                                                                                                                                                                                                                                  • GetStockObject.GDI32(00000011), ref: 00C16060
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000030,00000000), ref: 00C1606A
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CreateMessageObjectSendStockWindow
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3970641297-0
                                                                                                                                                                                                                                                  • Opcode ID: 535bddd5a0b0fd4c84b27ddfb899b0cc6f5b9194249d331a68f4e02c35e21ea0
                                                                                                                                                                                                                                                  • Instruction ID: db94eb2746635087707f027d907d1bb99daabacde9cdfb2a2ea40a8686e45d83
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 535bddd5a0b0fd4c84b27ddfb899b0cc6f5b9194249d331a68f4e02c35e21ea0
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 55115E72501548BFEF128F949C84BEEBF69EF0E358F040115FA1452110DB329DA0EB94
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • ___BuildCatchObject.LIBVCRUNTIME ref: 00C33B56
                                                                                                                                                                                                                                                    • Part of subcall function 00C33AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00C33AD2
                                                                                                                                                                                                                                                    • Part of subcall function 00C33AA3: ___AdjustPointer.LIBCMT ref: 00C33AED
                                                                                                                                                                                                                                                  • _UnwindNestedFrames.LIBCMT ref: 00C33B6B
                                                                                                                                                                                                                                                  • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00C33B7C
                                                                                                                                                                                                                                                  • CallCatchBlock.LIBVCRUNTIME ref: 00C33BA4
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 737400349-0
                                                                                                                                                                                                                                                  • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                                                                                                                                                                                                  • Instruction ID: 22a1d1d0223eb439dab6f8f5905e4b12e6dcb7cab1c021a52640b76a3cb47196
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 89010C32110189BBDF125E95CC46EEB7F6EEF58758F044014FE58A6121C736E961EBA0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00C113C6,00000000,00000000,?,00C4301A,00C113C6,00000000,00000000,00000000,?,00C4328B,00000006,FlsSetValue), ref: 00C430A5
                                                                                                                                                                                                                                                  • GetLastError.KERNEL32(?,00C4301A,00C113C6,00000000,00000000,00000000,?,00C4328B,00000006,FlsSetValue,00CB2290,FlsSetValue,00000000,00000364,?,00C42E46), ref: 00C430B1
                                                                                                                                                                                                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00C4301A,00C113C6,00000000,00000000,00000000,?,00C4328B,00000006,FlsSetValue,00CB2290,FlsSetValue,00000000), ref: 00C430BF
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: LibraryLoad$ErrorLast
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3177248105-0
                                                                                                                                                                                                                                                  • Opcode ID: 11ee30c961c4d6f40ae4fe3faddda55f604a67f71b85d965e0743be3c2e89c81
                                                                                                                                                                                                                                                  • Instruction ID: bf285a1538bcf2f727004d714edd62d1098f8657bf511b58bcced57277cfb8ec
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 11ee30c961c4d6f40ae4fe3faddda55f604a67f71b85d965e0743be3c2e89c81
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7001DB32701262ABCB314BB99C85B5B7B98BF86B65B210720F915E7190D721DA01C6E0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00C7747F
                                                                                                                                                                                                                                                  • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00C77497
                                                                                                                                                                                                                                                  • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00C774AC
                                                                                                                                                                                                                                                  • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00C774CA
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Type$Register$FileLoadModuleNameUser
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1352324309-0
                                                                                                                                                                                                                                                  • Opcode ID: 4fa009b6f48a5d67b8dd8f2c76c6893c1b170531c46c893c731fed78030e7f35
                                                                                                                                                                                                                                                  • Instruction ID: 036a6287b92f0908c73d6b502b18d51ccb52de491d41d8f73ebc5d326dba3033
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4fa009b6f48a5d67b8dd8f2c76c6893c1b170531c46c893c731fed78030e7f35
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6C11ADB1209318ABE7208F24DC49FA67FFCEB04B04F10C669A62AD7191D7B0E944DF60
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00C7ACD3,?,00008000), ref: 00C7B0C4
                                                                                                                                                                                                                                                  • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00C7ACD3,?,00008000), ref: 00C7B0E9
                                                                                                                                                                                                                                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00C7ACD3,?,00008000), ref: 00C7B0F3
                                                                                                                                                                                                                                                  • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00C7ACD3,?,00008000), ref: 00C7B126
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CounterPerformanceQuerySleep
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2875609808-0
                                                                                                                                                                                                                                                  • Opcode ID: c12b6fc05514562dc931264e18115f1b358979a7ad4be7d0fa43f50803e29de7
                                                                                                                                                                                                                                                  • Instruction ID: bdc75c45712d34054b625502ed01411a3f154cc00de1774be5b39e2970d3ca01
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c12b6fc05514562dc931264e18115f1b358979a7ad4be7d0fa43f50803e29de7
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5E113971E01929E7CF00AFA5E9A97EEBB78FF0A711F508086D955B2181CB305A518B51
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00CA7E33
                                                                                                                                                                                                                                                  • ScreenToClient.USER32(?,?), ref: 00CA7E4B
                                                                                                                                                                                                                                                  • ScreenToClient.USER32(?,?), ref: 00CA7E6F
                                                                                                                                                                                                                                                  • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00CA7E8A
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ClientRectScreen$InvalidateWindow
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 357397906-0
                                                                                                                                                                                                                                                  • Opcode ID: 5f3846d8e9d2271929afac0e0657f1418dc1979b5719329b1193b0f6047c62cd
                                                                                                                                                                                                                                                  • Instruction ID: b5d371c2ae34d4abc2923830c53ea498b3aecfd7a548bc97870b0257c963f42d
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5f3846d8e9d2271929afac0e0657f1418dc1979b5719329b1193b0f6047c62cd
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: F01144B9D0020AAFDB41CF98C884AEEBBF5FF09314F505156E915E3210D735AA54CF50
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00C72DC5
                                                                                                                                                                                                                                                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 00C72DD6
                                                                                                                                                                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00C72DDD
                                                                                                                                                                                                                                                  • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00C72DE4
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2710830443-0
                                                                                                                                                                                                                                                  • Opcode ID: c196448d35d58c6c14ec23f4d6425fb99dd31f281db65120e66bc119adbc0dab
                                                                                                                                                                                                                                                  • Instruction ID: 0e8b8f84880b4bd9f690755f305473d3dca5a9d2a6762652272abfc5a098b968
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c196448d35d58c6c14ec23f4d6425fb99dd31f281db65120e66bc119adbc0dab
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: FBE01271601224BBD7305B739C8EFEF7E6CEF57BA5F404115F609D20909AA5C941C6B0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C29639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00C29693
                                                                                                                                                                                                                                                    • Part of subcall function 00C29639: SelectObject.GDI32(?,00000000), ref: 00C296A2
                                                                                                                                                                                                                                                    • Part of subcall function 00C29639: BeginPath.GDI32(?), ref: 00C296B9
                                                                                                                                                                                                                                                    • Part of subcall function 00C29639: SelectObject.GDI32(?,00000000), ref: 00C296E2
                                                                                                                                                                                                                                                  • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00CA8887
                                                                                                                                                                                                                                                  • LineTo.GDI32(?,?,?), ref: 00CA8894
                                                                                                                                                                                                                                                  • EndPath.GDI32(?), ref: 00CA88A4
                                                                                                                                                                                                                                                  • StrokePath.GDI32(?), ref: 00CA88B2
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1539411459-0
                                                                                                                                                                                                                                                  • Opcode ID: 5653209a8b017fb74e96fcab77559de120307e8b6675914f81b216959ee7fb5d
                                                                                                                                                                                                                                                  • Instruction ID: d7c644b41729359c36b0c9349b4911c4ba2393d193c2aae6d53d9489f28d242c
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5653209a8b017fb74e96fcab77559de120307e8b6675914f81b216959ee7fb5d
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1CF03A36045259BBDB125F94AC4DFCE3A69AF06714F448000FA11660E2CB795621DBA9
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetSysColor.USER32(00000008), ref: 00C298CC
                                                                                                                                                                                                                                                  • SetTextColor.GDI32(?,?), ref: 00C298D6
                                                                                                                                                                                                                                                  • SetBkMode.GDI32(?,00000001), ref: 00C298E9
                                                                                                                                                                                                                                                  • GetStockObject.GDI32(00000005), ref: 00C298F1
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Color$ModeObjectStockText
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 4037423528-0
                                                                                                                                                                                                                                                  • Opcode ID: 56fccaedb3c929e5adeab25d5aa35d4590da73fd56487708e1424a00fb7f07ae
                                                                                                                                                                                                                                                  • Instruction ID: ff7851e82e61b56a7fe2f12251922552047c89bcc066824ead11c24397771e9b
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 56fccaedb3c929e5adeab25d5aa35d4590da73fd56487708e1424a00fb7f07ae
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 29E06D31244280AADB215B74BC49BEC3F60EB1333AF048719F7FA590E1C77246809B10
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetCurrentThread.KERNEL32 ref: 00C71634
                                                                                                                                                                                                                                                  • OpenThreadToken.ADVAPI32(00000000,?,?,?,00C711D9), ref: 00C7163B
                                                                                                                                                                                                                                                  • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00C711D9), ref: 00C71648
                                                                                                                                                                                                                                                  • OpenProcessToken.ADVAPI32(00000000,?,?,?,00C711D9), ref: 00C7164F
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CurrentOpenProcessThreadToken
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 3974789173-0
                                                                                                                                                                                                                                                  • Opcode ID: 911fb21e15d4ded294811b8dbac367c14bb883d71d46b526b365be2d3556e927
                                                                                                                                                                                                                                                  • Instruction ID: 81706ba852b423ad8086d2562c72fbdf9bd3f738ebd3e7361770850c529bb06d
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 911fb21e15d4ded294811b8dbac367c14bb883d71d46b526b365be2d3556e927
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6AE08631602211DBD7201FA49D4DB8B3B7CEF46795F188808F655CA090D6344540C750
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetDesktopWindow.USER32 ref: 00C6D858
                                                                                                                                                                                                                                                  • GetDC.USER32(00000000), ref: 00C6D862
                                                                                                                                                                                                                                                  • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00C6D882
                                                                                                                                                                                                                                                  • ReleaseDC.USER32(?), ref: 00C6D8A3
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2889604237-0
                                                                                                                                                                                                                                                  • Opcode ID: 2d6df768dd555a2cd7ced0b0c90e4d3393162a605f171fd40dc3d672dd461daa
                                                                                                                                                                                                                                                  • Instruction ID: a9f844dd82541a9296a236c59cb3687de1dcfd39fcfe4cd9dcea4594e6d17117
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2d6df768dd555a2cd7ced0b0c90e4d3393162a605f171fd40dc3d672dd461daa
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: FEE01AB0800204DFCB419FA5D88C76DBBB1FB09314F108009F816E7350CB388941AF40
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetDesktopWindow.USER32 ref: 00C6D86C
                                                                                                                                                                                                                                                  • GetDC.USER32(00000000), ref: 00C6D876
                                                                                                                                                                                                                                                  • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00C6D882
                                                                                                                                                                                                                                                  • ReleaseDC.USER32(?), ref: 00C6D8A3
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 2889604237-0
                                                                                                                                                                                                                                                  • Opcode ID: 31f5494e7346bfdd36a73a096d7e0ca49b56139d33e57dded313e0d645453658
                                                                                                                                                                                                                                                  • Instruction ID: 67f3087fafa87b75a1094aaa9d209e4b5ec4dada22d5278db787f1c1c100bf94
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 31f5494e7346bfdd36a73a096d7e0ca49b56139d33e57dded313e0d645453658
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: BFE092B5800204EFCB51AFA5D88876EBBB5BB09315B148449F95AE7360CB389942AF50
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C17620: _wcslen.LIBCMT ref: 00C17625
                                                                                                                                                                                                                                                  • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00C84ED4
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Connection_wcslen
                                                                                                                                                                                                                                                  • String ID: *$LPT
                                                                                                                                                                                                                                                  • API String ID: 1725874428-3443410124
                                                                                                                                                                                                                                                  • Opcode ID: 241c1fe5e5fa149bb4d006f361e4e937fe67a98951d11b8617043122c7bd55d9
                                                                                                                                                                                                                                                  • Instruction ID: d15950b8a9921f2cddabe309642715cb9c620e5761f6923d62b009d5c9b75bd9
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 241c1fe5e5fa149bb4d006f361e4e937fe67a98951d11b8617043122c7bd55d9
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 08919275A002059FCB18EF98C484EAABBF1BF45308F15809DE51A9F362C731EE85DB94
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • __startOneArgErrorHandling.LIBCMT ref: 00C3E30D
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ErrorHandling__start
                                                                                                                                                                                                                                                  • String ID: pow
                                                                                                                                                                                                                                                  • API String ID: 3213639722-2276729525
                                                                                                                                                                                                                                                  • Opcode ID: 7624e3b0b3cde17b2ded52e2722441a51ea598752b00c333ca4c4945f6e66121
                                                                                                                                                                                                                                                  • Instruction ID: b0f57e841164c79f90398cce5892df30772df8d2678d857dac04063210cef1e6
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7624e3b0b3cde17b2ded52e2722441a51ea598752b00c333ca4c4945f6e66121
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 23512A61E2C2029ADB157724C9413BE3BA4FF40740F748F58E4F5822F9EB358D95AB86
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                                  • String ID: #
                                                                                                                                                                                                                                                  • API String ID: 0-1885708031
                                                                                                                                                                                                                                                  • Opcode ID: 262654b6368c727d16d01a7cd7e481e1f8347bc97c78de17cb1902a28d28a834
                                                                                                                                                                                                                                                  • Instruction ID: 8846222410aae35b4540b71fdc69fa2126c7dfb7fc3158677d1957d1418718b7
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 262654b6368c727d16d01a7cd7e481e1f8347bc97c78de17cb1902a28d28a834
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: F8513679500256DFDF25DF68D081AFA7BA8EF16310F244056FCA2AB2C0D7349E42DBA0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • Sleep.KERNEL32(00000000), ref: 00C2F2A2
                                                                                                                                                                                                                                                  • GlobalMemoryStatusEx.KERNEL32(?), ref: 00C2F2BB
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: GlobalMemorySleepStatus
                                                                                                                                                                                                                                                  • String ID: @
                                                                                                                                                                                                                                                  • API String ID: 2783356886-2766056989
                                                                                                                                                                                                                                                  • Opcode ID: 0af7c62d41b143cc205cf75583c6ee69b2889d870091b6f00a75a0f32b47f19e
                                                                                                                                                                                                                                                  • Instruction ID: 7897c61a9405c8db4125bcdc3a31a3bbcef2f7e407e6328932ee64db824b38fb
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0af7c62d41b143cc205cf75583c6ee69b2889d870091b6f00a75a0f32b47f19e
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: C05134714087449BD320EF54D886BAFBBF8FB86300F81885DF199421A5EB308569DB66
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 00C957E0
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C957EC
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: BuffCharUpper_wcslen
                                                                                                                                                                                                                                                  • String ID: CALLARGARRAY
                                                                                                                                                                                                                                                  • API String ID: 157775604-1150593374
                                                                                                                                                                                                                                                  • Opcode ID: af15cb644904f1ad62d8f893bba2a63fd73ed2e4cf53627eba08716160150400
                                                                                                                                                                                                                                                  • Instruction ID: 85b262f4c411a40b9df7c75021bae06a3cc006f581ae8ebbaf2fbd18043f36b7
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: af15cb644904f1ad62d8f893bba2a63fd73ed2e4cf53627eba08716160150400
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A041AE71A002099FCF05DFA9C8899AEBBB5FF59724F108069E515A7291E7309E81DB90
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C8D130
                                                                                                                                                                                                                                                  • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00C8D13A
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CrackInternet_wcslen
                                                                                                                                                                                                                                                  • String ID: |
                                                                                                                                                                                                                                                  • API String ID: 596671847-2343686810
                                                                                                                                                                                                                                                  • Opcode ID: a4fd93a83ae857885b9e07b6a0f8bbbe9ff37520b5afaf71faf30b398b940604
                                                                                                                                                                                                                                                  • Instruction ID: cc9d0f41b01070fef11f665421d0db1f619f789e0e5a5455cf699e42f7ca69c3
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: a4fd93a83ae857885b9e07b6a0f8bbbe9ff37520b5afaf71faf30b398b940604
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8C314F71D00209ABCF15EFA5CC85EEE7FB9FF05314F000119F816A61A5DB31AA56EB54
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • DestroyWindow.USER32(?,?,?,?), ref: 00CA3621
                                                                                                                                                                                                                                                  • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00CA365C
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Window$DestroyMove
                                                                                                                                                                                                                                                  • String ID: static
                                                                                                                                                                                                                                                  • API String ID: 2139405536-2160076837
                                                                                                                                                                                                                                                  • Opcode ID: ce1c8de22da757817790a869f926f5f687f802b73bae809b77fe50ee1362b4db
                                                                                                                                                                                                                                                  • Instruction ID: 344692d684696b354ca99e8d2345916292fa7aebcb6e4676ed2de574e6fee0af
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: ce1c8de22da757817790a869f926f5f687f802b73bae809b77fe50ee1362b4db
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1131BE71500245AEDB10DF68DC90FFB73A9FF8A728F008619F9A597280DA30EE81D760
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 00CA461F
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00CA4634
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: MessageSend
                                                                                                                                                                                                                                                  • String ID: '
                                                                                                                                                                                                                                                  • API String ID: 3850602802-1997036262
                                                                                                                                                                                                                                                  • Opcode ID: 318b71f12dbc4cccbb2d9cc78da374cbe211553a424a1f44c2f41c7ce726350d
                                                                                                                                                                                                                                                  • Instruction ID: bc25b3435b575065800350a5b58ac8323174d15a44dcb872861c47a19683ee29
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 318b71f12dbc4cccbb2d9cc78da374cbe211553a424a1f44c2f41c7ce726350d
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 94311974E0120A9FDB18CFA9C994BDA7BB5FF8A304F144069E915AB351D7B0A941CF90
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00CA327C
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00CA3287
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: MessageSend
                                                                                                                                                                                                                                                  • String ID: Combobox
                                                                                                                                                                                                                                                  • API String ID: 3850602802-2096851135
                                                                                                                                                                                                                                                  • Opcode ID: 1307537f2308dd3637b947402f3aeb53ebc3332cd3e2da6a08948cee6f747a2b
                                                                                                                                                                                                                                                  • Instruction ID: 2e366f6ccf4398975f655952c487388807bce03da00a97d830b207c20ad5e1c2
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1307537f2308dd3637b947402f3aeb53ebc3332cd3e2da6a08948cee6f747a2b
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: E811E6713002497FEF219E94DC90FBB376AEB56368F100225F92497291D6319E519760
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C1600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00C1604C
                                                                                                                                                                                                                                                    • Part of subcall function 00C1600E: GetStockObject.GDI32(00000011), ref: 00C16060
                                                                                                                                                                                                                                                    • Part of subcall function 00C1600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00C1606A
                                                                                                                                                                                                                                                  • GetWindowRect.USER32(00000000,?), ref: 00CA377A
                                                                                                                                                                                                                                                  • GetSysColor.USER32(00000012), ref: 00CA3794
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                                                                                                                                                                                                  • String ID: static
                                                                                                                                                                                                                                                  • API String ID: 1983116058-2160076837
                                                                                                                                                                                                                                                  • Opcode ID: a06b247b284e6f1b0a765e272317c72fdf273977ec65c5276c2a3c4de05a96bf
                                                                                                                                                                                                                                                  • Instruction ID: 89cb4611c4132dc8e205507243055fd608077d135c0f721e817b64f939d9c45a
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: a06b247b284e6f1b0a765e272317c72fdf273977ec65c5276c2a3c4de05a96bf
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5F1129B261020AAFDB00DFA8CD45EFE7BB8EB0A358F004524F965E3250E735E9519B60
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00C8CD7D
                                                                                                                                                                                                                                                  • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00C8CDA6
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Internet$OpenOption
                                                                                                                                                                                                                                                  • String ID: <local>
                                                                                                                                                                                                                                                  • API String ID: 942729171-4266983199
                                                                                                                                                                                                                                                  • Opcode ID: 24ee5c9e7e8e12e4eabee8c2d5d3c9d9b71913744aa53bb601a1919c71acd750
                                                                                                                                                                                                                                                  • Instruction ID: c1a63be00c400f3b9d336be049fc8de2b10ac5a555087777f12ba0bd2f772922
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 24ee5c9e7e8e12e4eabee8c2d5d3c9d9b71913744aa53bb601a1919c71acd750
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9211A071205631BAD7286B668CC9FE7BEA8EB137A8F00423BF11983180D7709951D7F4
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetWindowTextLengthW.USER32(00000000), ref: 00CA34AB
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00CA34BA
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: LengthMessageSendTextWindow
                                                                                                                                                                                                                                                  • String ID: edit
                                                                                                                                                                                                                                                  • API String ID: 2978978980-2167791130
                                                                                                                                                                                                                                                  • Opcode ID: e47d04e3918b005ae051d507b7efdc1deaaa1cdf94d284e1920c7af8d709f1bd
                                                                                                                                                                                                                                                  • Instruction ID: c50fed5f147387fc2056b16069eb1b28842620f12ef905ecc9545e3858478337
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e47d04e3918b005ae051d507b7efdc1deaaa1cdf94d284e1920c7af8d709f1bd
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 97118F7150024AAFEB128E64DC94BEB3B6AEB0A37CF504724F971971D0C771DE91AB50
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C19CB3: _wcslen.LIBCMT ref: 00C19CBD
                                                                                                                                                                                                                                                  • CharUpperBuffW.USER32(?,?,?), ref: 00C76CB6
                                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00C76CC2
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                                                                  • String ID: STOP
                                                                                                                                                                                                                                                  • API String ID: 1256254125-2411985666
                                                                                                                                                                                                                                                  • Opcode ID: d37500949dfcc9e5a37fce13763d83d1eb504fb53d94e207809af65f865e67fd
                                                                                                                                                                                                                                                  • Instruction ID: 218eacbff30c41cdd68c1bafdbe6a9775a27960571a3bf634008751d190db2bd
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: d37500949dfcc9e5a37fce13763d83d1eb504fb53d94e207809af65f865e67fd
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8C0126326109268BCB21AFFDCC909FF33B8EF61710B104524E96697190EB31DA40D650
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C19CB3: _wcslen.LIBCMT ref: 00C19CBD
                                                                                                                                                                                                                                                    • Part of subcall function 00C73CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00C73CCA
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00C71D4C
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                                  • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                  • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                                  • Opcode ID: 32aab1310725374a38893ac2a51881dc7bad3ac564de45d11f0f50f5cfaf1263
                                                                                                                                                                                                                                                  • Instruction ID: 50d27e8d44c8b81814c1a55521eba9fe7c696c62a58d80b77bdc21ee898bf44d
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 32aab1310725374a38893ac2a51881dc7bad3ac564de45d11f0f50f5cfaf1263
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4501FC71601214ABCB15EBA8CC61DFE7368FF57390F04461AFC76573C1EA305908AB60
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C19CB3: _wcslen.LIBCMT ref: 00C19CBD
                                                                                                                                                                                                                                                    • Part of subcall function 00C73CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00C73CCA
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000180,00000000,?), ref: 00C71C46
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                                  • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                  • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                                  • Opcode ID: f8a54472cb5b0bd3a878de82ce57134dbdabd24ec0408b06b04c6519a6e9a5b6
                                                                                                                                                                                                                                                  • Instruction ID: 8aa64d59a9a8a1e1154335539a1629164c4bff6e34df86e22760766c544c922e
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: f8a54472cb5b0bd3a878de82ce57134dbdabd24ec0408b06b04c6519a6e9a5b6
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: B701A77578110467DB05EBD4C962AFF77A8DB13380F24401ABD5A672C1EA209F18A6B1
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C19CB3: _wcslen.LIBCMT ref: 00C19CBD
                                                                                                                                                                                                                                                    • Part of subcall function 00C73CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00C73CCA
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000182,?,00000000), ref: 00C71CC8
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                                  • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                  • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                                  • Opcode ID: ce0df8ff80249716c3e0be024fb98c52a2067853cface005755131cf860f28fc
                                                                                                                                                                                                                                                  • Instruction ID: a909011f9f9af8cd0132434bbef4ec07eea8e599ce1ceca54bfc0044e2308511
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: ce0df8ff80249716c3e0be024fb98c52a2067853cface005755131cf860f28fc
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4401DB7174011467DB05EBD8CA12AFF77A89B13380F144016BD46732C1EA309F18E6B1
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C19CB3: _wcslen.LIBCMT ref: 00C19CBD
                                                                                                                                                                                                                                                    • Part of subcall function 00C73CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00C73CCA
                                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00C71DD3
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                                  • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                  • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                                  • Opcode ID: 99ca9a0af215e757f0ba16b8dc05c576ca39ba369a679d79c3aba1b166083437
                                                                                                                                                                                                                                                  • Instruction ID: b7c0f8a23366056dae8d92393f520ad7501a82104d223cddd2d75025b28c17d7
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 99ca9a0af215e757f0ba16b8dc05c576ca39ba369a679d79c3aba1b166083437
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: DEF0A471B5121467DB15E7A8CC62BFF77A8EB13390F080916BD66632C1DA705A08A6A0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: _wcslen
                                                                                                                                                                                                                                                  • String ID: 3, 3, 16, 1
                                                                                                                                                                                                                                                  • API String ID: 176396367-3042988571
                                                                                                                                                                                                                                                  • Opcode ID: d34cb8de1639c6710f7b9942549407b95c662ffcccb64fe9b05552182405c359
                                                                                                                                                                                                                                                  • Instruction ID: 5069212646a858b83c88bd898182126d100ba6eecf2ef0eaaa4e59c55d723dde
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: d34cb8de1639c6710f7b9942549407b95c662ffcccb64fe9b05552182405c359
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: CCE061023363201097351279DCC5B7F578DCFCD760B14192BF985C2267EA94DE91A7A0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00C70B23
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Message
                                                                                                                                                                                                                                                  • String ID: AutoIt$Error allocating memory.
                                                                                                                                                                                                                                                  • API String ID: 2030045667-4017498283
                                                                                                                                                                                                                                                  • Opcode ID: 1f66f73eaab1827615b756ff56a0e8d29a8f036e24af20c96dff289186381bf3
                                                                                                                                                                                                                                                  • Instruction ID: e27469d67d84821241c09ae12a4a3bf8c846f8d99cb1dae38af7ad51819560fe
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1f66f73eaab1827615b756ff56a0e8d29a8f036e24af20c96dff289186381bf3
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: FDE0D83124431826D21437547C43F897A848F06B25F10043BF758955C38EE1659166E9
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                    • Part of subcall function 00C2F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00C30D71,?,?,?,00C1100A), ref: 00C2F7CE
                                                                                                                                                                                                                                                  • IsDebuggerPresent.KERNEL32(?,?,?,00C1100A), ref: 00C30D75
                                                                                                                                                                                                                                                  • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00C1100A), ref: 00C30D84
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00C30D7F
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                                                                                                                                                                                                                  • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                                                                                                                                                                                  • API String ID: 55579361-631824599
                                                                                                                                                                                                                                                  • Opcode ID: 821d13663de54b74360534878147e7f6bc901071e3f1a52c99bcf2ac346fc91a
                                                                                                                                                                                                                                                  • Instruction ID: 68e876f3cc7322140a3c679b13fe0d2b0fb1034ca9823740f3af8eabd3152f8c
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 821d13663de54b74360534878147e7f6bc901071e3f1a52c99bcf2ac346fc91a
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: D7E06DB02007518BD7209FB8E45834A7BE0AB05748F104A2DE482C7651DBB4E4859B91
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00C8302F
                                                                                                                                                                                                                                                  • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00C83044
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: Temp$FileNamePath
                                                                                                                                                                                                                                                  • String ID: aut
                                                                                                                                                                                                                                                  • API String ID: 3285503233-3010740371
                                                                                                                                                                                                                                                  • Opcode ID: 725bff7603fc62b5b160e24f8090e91e83cd6322f01574843907eab221fa8de6
                                                                                                                                                                                                                                                  • Instruction ID: d97b3adf468154d3b809746aa539223165fa043a1f2a508fe3c75a7823b5297e
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 725bff7603fc62b5b160e24f8090e91e83cd6322f01574843907eab221fa8de6
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 28D05EB250032867DA20A7A4AD4EFCB7B6CDB05754F0002A2B696E3191DBB49984CAD0
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: LocalTime
                                                                                                                                                                                                                                                  • String ID: %.3d$X64
                                                                                                                                                                                                                                                  • API String ID: 481472006-1077770165
                                                                                                                                                                                                                                                  • Opcode ID: 188f9ec5fa5f3dcf9ad37beb073ee2e7d134fc0610dfe2fe7364214cfb66a9a7
                                                                                                                                                                                                                                                  • Instruction ID: 5bc4e8b313ffcf39edc8827152a7bf6a901c72579920c961e4974df1ff2d42bb
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 188f9ec5fa5f3dcf9ad37beb073ee2e7d134fc0610dfe2fe7364214cfb66a9a7
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 88D012A1D08118EACBA096D2DCD59B9B37CAB18301F508462F90792040E734C9086761
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00CA236C
                                                                                                                                                                                                                                                  • PostMessageW.USER32(00000000), ref: 00CA2373
                                                                                                                                                                                                                                                    • Part of subcall function 00C7E97B: Sleep.KERNEL32 ref: 00C7E9F3
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: FindMessagePostSleepWindow
                                                                                                                                                                                                                                                  • String ID: Shell_TrayWnd
                                                                                                                                                                                                                                                  • API String ID: 529655941-2988720461
                                                                                                                                                                                                                                                  • Opcode ID: 2950ca9a6a52f57b264064dcfdf42b8de20fecff6972bae2d1d1c75eb7172dfd
                                                                                                                                                                                                                                                  • Instruction ID: 7bd559cecf928f9f2713a1c422290344982fafef841786108d142048714658eb
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2950ca9a6a52f57b264064dcfdf42b8de20fecff6972bae2d1d1c75eb7172dfd
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: FFD0C9327853107AE664A771AC4FFCA76149B16B14F0149167755AB1D0C9A0A841CA54
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00CA232C
                                                                                                                                                                                                                                                  • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00CA233F
                                                                                                                                                                                                                                                    • Part of subcall function 00C7E97B: Sleep.KERNEL32 ref: 00C7E9F3
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: FindMessagePostSleepWindow
                                                                                                                                                                                                                                                  • String ID: Shell_TrayWnd
                                                                                                                                                                                                                                                  • API String ID: 529655941-2988720461
                                                                                                                                                                                                                                                  • Opcode ID: a7325656309037ae97e03dd69f7650d747481e20f9eae4d556ff51ef8afb3c18
                                                                                                                                                                                                                                                  • Instruction ID: f636260ab1c92fd49d4b55f99f0fb9799494ff4b89203d61efdaab9f8c5b6c1d
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: a7325656309037ae97e03dd69f7650d747481e20f9eae4d556ff51ef8afb3c18
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 64D01237794310B7E664B771EC4FFCA7A149B15B14F0149167759AB1D0C9F0A841CA54
                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 00C4BE93
                                                                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00C4BEA1
                                                                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00C4BEFC
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1747128099.0000000000C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C10000, based on PE: true
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747092932.0000000000C10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747251590.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747324671.0000000000CDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1747361308.0000000000CE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_c10000_file.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: ByteCharMultiWide$ErrorLast
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID: 1717984340-0
                                                                                                                                                                                                                                                  • Opcode ID: 5dbc43dfcd3cd6ff670fad9de0ebe89c1781e6a1d727fab9f713736abc3852e4
                                                                                                                                                                                                                                                  • Instruction ID: ce0a9e41b9cedf1470d40aa765156cdcfccc6d4f1a2334665f12e7447b7cc076
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5dbc43dfcd3cd6ff670fad9de0ebe89c1781e6a1d727fab9f713736abc3852e4
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A241B338604206AFEF25CFA5CD84BAA7BA5BF42320F144169F96D971A1DB31CE05DB60
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 0000000D.00000003.1891252060.00000250907C1000.00000020.00000800.00020000.00000000.sdmp, Offset: 00000250907C1000, based on PE: false
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_13_3_250907c1000_firefox.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                                  • Opcode ID: 405df64a7c5d55e32298374ad00c3b8638321db2bcb9b167759382938f56dddd
                                                                                                                                                                                                                                                  • Instruction ID: b29244038973b7a2b6b743bf6ef9a79cc11b39babc2ce5b858cca6f658c73373
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 405df64a7c5d55e32298374ad00c3b8638321db2bcb9b167759382938f56dddd
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: E221CA30208A899FCB45EF68D8E4F94BBF4FF1E300B0445DCE588CB293C626A845CB51

                                                                                                                                                                                                                                                  Execution Graph

                                                                                                                                                                                                                                                  Execution Coverage:0.4%
                                                                                                                                                                                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                                                                  Signature Coverage:100%
                                                                                                                                                                                                                                                  Total number of Nodes:6
                                                                                                                                                                                                                                                  Total number of Limit Nodes:0
                                                                                                                                                                                                                                                  execution_graph 5013 22ee9575772 5014 22ee95757c9 NtQuerySystemInformation 5013->5014 5015 22ee9573b44 5013->5015 5014->5015 5010 22ee8df5bf7 5011 22ee8df5c07 NtQuerySystemInformation 5010->5011 5012 22ee8df5ba4 5011->5012

                                                                                                                                                                                                                                                  Callgraph

                                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                                  • Source File: 00000010.00000002.3559158576.0000022EE9573000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022EE9573000, based on PE: false
                                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                  • Snapshot File: hcaresult_16_2_22ee9573000_firefox.jbxd
                                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                                  • API ID: InformationQuerySystem
                                                                                                                                                                                                                                                  • String ID: #$#$#$4$>$>$>$A$z$z
                                                                                                                                                                                                                                                  • API String ID: 3562636166-3072146587
                                                                                                                                                                                                                                                  • Opcode ID: a7beeb6ed6d4bd1c13836e24e4a4bf8602c8d7752103ee20adf8d6ea9f6b849f
                                                                                                                                                                                                                                                  • Instruction ID: 0021d05153ae0c7686c1eb8393491cc6b88d31cea031d40f9313ec266be6f7df
                                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: a7beeb6ed6d4bd1c13836e24e4a4bf8602c8d7752103ee20adf8d6ea9f6b849f
                                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: B0A3F431A18A488BDB3DDF68DC956E973E5FB98310F15422ED94AC7251DF30EA068BC1